FreeBSD : libzmq4 -- V3 protocol handler vulnerable to downgrade attacks (10a6d0aa-0b1c-11e5-bb90-002590263bf5)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Pieter Hintjens reports :

It is easy to bypass the security mechanism in 4.1.0 and 4.0.5 by
sending a ZMTP v2 or earlier header. The library accepts such
connections without applying its security mechanism.

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 84104 ()

Bugtraq ID:

CVE ID: CVE-2014-9721

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now