This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote Debian host is missing a security-related update.
Several vulnerabilities have been discovered in abuse, the SDL port of
the Abuse action game. The Common Vulnerabilities and Exposures
project identifies the following problems :
Erik SjÃ¶lund discovered several buffer overflows in the
command line handling, which could lead to the execution
of arbitrary code with elevated privileges since it is
installed setuid root.
Steve Kemp discovered that abuse creates some files
without dropping privileges first, which may lead to the
creation and overwriting of arbitrary files.
See also :
Upgrade the abuse package.
For the stable distribution (woody) these problems have been fixed in
Risk factor :
Medium / CVSS Base Score : 4.6