This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200601-14
(LibAST: Privilege escalation)
Michael Jennings discovered an exploitable buffer overflow in the
configuration engine of LibAST.
The vulnerability can be exploited to gain escalated privileges if the
application using LibAST is setuid/setgid and passes a specifically
crafted filename to LibAST's configuration engine.
Identify all applications linking against LibAST and verify they are
See also :
All users should upgrade to the latest version and run revdep-rebuild:
# emerge --sync
# emerge --ask --oneshot --verbose '>=x11-libs/libast-0.7'
Risk factor :
Medium / CVSS Base Score : 4.6
Family: Gentoo Local Security Checks
Nessus Plugin ID: 20822 (gentoo_GLSA-200601-14.nasl)
CVE ID: CVE-2006-0224
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.