This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Fixed a number of very serious errors in the usage of
The return value was being used as the length of the string printed
into the buffer, but the return value really indicates the length of
the string that *could* be printed if the buffer were of infinite
size. Because the returned value could be larger than the buffer's
size, this meant remotely exploitable buffer overflows were possible,
depending on spamdyke's configuration.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5