This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200511-10
(RAR: Format string and buffer overflow vulnerabilities)
Tan Chew Keong reported about two vulnerabilities found in RAR:
A format string error exists when displaying a diagnostic
error message that informs the user of an invalid filename in an
UUE/XXE encoded file.
Some boundary errors in the processing
of malicious ACE archives can be exploited to cause a buffer
A remote attacker could exploit these vulnerabilities by enticing
a user to:
decode a specially crafted UUE/XXE file,
extract a malicious ACE archive containing a file with an
overly long filename.
When the user performs these
actions, the arbitrary code of the attacker's choice will be executed.
There is no known workaround at this time.
See also :
All RAR users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-arch/rar-3.5.1'
Risk factor :
Family: Gentoo Local Security Checks
Nessus Plugin ID: 20197 (gentoo_GLSA-200511-10.nasl)
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.