This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
A siyahsapka.org advisory reads :
Hafiye-1.0 doesnt filter the payload when printing it to the terminal.
A malicious attacker can send packets with escape sequence payloads to
exploit this vulnerability.
If Hafiye has been started with -n packet count option , the
vulnerability could allow remote code execution. For remote code
execution the victim must press Enter after program exit.
Note that it appears that this bug can only be exploited in
conjunction with a terminal emulator that honors the appropriate
See also :
Update the affected package.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 37293 (freebsd_pkg_027380b7340411d9ac1b000d614f7fad.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now