This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200702-09
(Nexuiz: Multiple vulnerabilities)
Nexuiz fails to correctly validate input within 'clientcommands'. There
is also a failure to correctly handle connection attempts from remote
Using a specially crafted 'clientcommand' a remote attacker can cause a
buffer overflow in Nexuiz which could result in the execution of
arbitrary code. Additionally, there is a Denial of Service
vulnerability in Nexuiz allowing an attacker to cause Nexuiz to crash
or to run out of resources by overloading it with specially crafted
There is no known workaround at this time.
See also :
All Nexuiz users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=games-fps/nexuiz-2.2.1'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 24721 (gentoo_GLSA-200702-09.nasl)
CVE ID: CVE-2006-6609CVE-2006-6610
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.