This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Two vulnerabilities have been reported in libsndfile, which can be
exploited by malicious people to compromise an application using the
A boundary error exists within the 'voc_read_header()' function in
src/voc.c. This can be exploited to cause a heap-based buffer overflow
via a specially crafted VOC file.
A boundary error exists within the 'aiff_read_header()' function in
src/aiff.c. This can be exploited to cause a heap-based buffer
overflow via a specially crafted AIFF file.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 9.3
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 38964 (freebsd_pkg_6355efdb4d4d11de88110030843d3802.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now