This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
The nginx project reports :
A bug in the experimental SPDY implementation in nginx 1.5.10 was
found, which might allow an attacker to corrupt worker process memory
by using a specially crafted request, potentially resulting in
arbitrary code execution (CVE-2014-0088).
The problem only affects nginx 1.5.10 on 32-bit platforms, compiled
with the ngx_http_spdy_module module (which is not compiled by
default), if the 'spdy' option of the 'listen' directive is used in a
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5