This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
Some vulnerabilities have been reported in APR-util, which can be
exploited by malicious users and malicious people to cause a DoS
(Denial of Service).
A vulnerability is caused due to an error in the processing of XML
files and can be exploited to exhaust all available memory via a
specially crafted XML file containing a predefined entity inside an
A vulnerability is caused due to an error within the
'apr_strmatch_precompile()' function in strmatch/apr_strmatch.c, which
can be exploited to crash an application using the library.
RedHat reports :
A single NULL byte buffer overflow flaw was found in apr-util's
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 39320 (freebsd_pkg_eb9212f7526b11debbf2001b77d09812.nasl)
Bugtraq ID: 35221
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now