FreeBSD : iodined -- authentication bypass (0981958a-f733-11e3-8276-071f1604ef8a)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Erik Ekman of the iodine project reports :

The client could bypass the password check by continuing after getting
error from the server and guessing the network parameters. The server
would still accept the rest of the setup and also network traffic.

See also :

http://www.nessus.org/u?ad163268
http://www.nessus.org/u?b53b3e2c

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 76134 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now