This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
PEAR Security Advisory reports :
Multiple remote arbitrary command injections have been found in the
Net_Ping and Net_Traceroute.
When input from forms are used directly, the attacker could pass
variables that would allow him to execute remote arbitrary command
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 43626 (freebsd_pkg_56ba8728f98711deb28d00215c6a37bb.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now