This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Adobe reports :
These updates resolve a type confusion vulnerability that could lead
to code execution (CVE-2015-5573).
These updates resolve use-after-free vulnerabilities that could lead
to code execution (CVE-2015-5570, CVE-2015-5574, CVE-2015-5581,
These updates resolve buffer overflow vulnerabilities that could lead
to code execution (CVE-2015-6676, CVE-2015-6678).
These updates resolve memory corruption vulnerabilities that could
lead to code execution (CVE-2015-5575, CVE-2015-5577, CVE-2015-5578,
CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, CVE-2015-6677).
These updates include additional validation checks to ensure that
Flash Player rejects malicious content from vulnerable JSONP callback
These updates resolve a memory leak vulnerability (CVE-2015-5576).
These updates include further hardening to a mitigation to defend
against vector length corruptions (CVE-2015-5568).
These updates resolve stack corruption vulnerabilities that could lead
to code execution (CVE-2015-5567, CVE-2015-5579).
These updates resolve a stack overflow vulnerability that could lead
to code execution (CVE-2015-5587).
These updates resolve a security bypass vulnerability that could lead
to information disclosure (CVE-2015-5572).
These updates resolve a vulnerability that could be exploited to
bypass the same-origin-policy and lead to information disclosure
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 86188 ()
CVE ID: CVE-2015-5567
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now