This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
The Apache HTTP Server 2.0.51 release notes report that the following
issues have been fixed :
A segfault in mod_ssl which can be triggered by a malicious remote
server, if proxying to SSL servers has been configured.
A potential infinite loop in mod_ssl which could be triggered given
particular timing of a connection abort. [CAN-2004-0748]
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.7
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 37076 (freebsd_pkg_7b81fc47239f11d9814e0001020eed82.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now