This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
The [email protected] client contains a buffer overflow in the HTTP response
handler. A malicious, spoofed [email protected] server can exploit this buffer
overflow to cause remote code execution on the client. Exploit
programs are widely available.
See also :
Update the affected package.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 38114 (freebsd_pkg_0e154a9c5d7a11d880e30020ed76ef5a.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now