How to Buy
This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200608-22
(fbida: Arbitrary command execution)
Toth Andras has discovered a typographic mistake in the 'fbgs' script,
shipped with fbida if the 'fbcon' and 'pdf' USE flags are both enabled.
This script runs 'gs' without the -dSAFER option, thus allowing a
PostScript file to execute, delete or create any kind of file on the
A remote attacker can entice a vulnerable user to view a malicious
PostScript or PDF file with fbgs, which may result with the execution
of arbitrary code.
There is no known workaround at this time.
See also :
All fbida users with the 'fbcon' and 'pdf' USE flags both enabled
should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=media-gfx/fbida-2.03-r4'
Risk factor :
Medium / CVSS Base Score : 5.1
CVSS Temporal Score : 4.0
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 22284 (gentoo_GLSA-200608-22.nasl)
Bugtraq ID: 19131
CVE ID: CVE-2006-3119
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.