This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.
The remote chat server is affected by a format string vulnerability.
According to its banner, the version of the ngIRCd chat service
running on the remote host contains a format string vulnerability. If
it was compiled with IDENT, DEBUG is enabled, and it's logging to
SYSLOG, a remote attacker can leverage this issue to execute arbitrary
code on the remote host subject to the privileges under which the
service operates, which is 'root' by default.
See also :
Upgrade to ngIRCd 0.8.3 or later.
Risk factor :
High / CVSS Base Score : 7.6
CVSS Temporal Score : 7.2
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 16310 ()
Bugtraq ID: 12434
CVE ID: CVE-2005-0226
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.