FreeBSD : iodined -- authentication bypass (0981958a-f733-11e3-8276-071f1604ef8a)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Erik Ekman of the iodine project reports :

The client could bypass the password check by continuing after getting
error from the server and guessing the network parameters. The server
would still accept the rest of the setup and also network traffic.

See also :

Solution :

Update the affected package.

Risk factor :


Family: FreeBSD Local Security Checks

Nessus Plugin ID: 76134 ()

Bugtraq ID:


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now