This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200903-26
(TMSNC: Execution of arbitrary code)
Nico Golde reported a stack-based buffer overflow when processing a MSN
packet with a UBX command containing a large UBX payload length field.
A remote attacker could send a specially crafted message, possibly
resulting in the execution of arbitrary code.
There is no known workaround at this time.
See also :
Since TMSNC is no longer maintained, we recommend that users unmerge
the vulnerable package and switch to another console-based MSN client
such as CenterIM or Pebrot:
# emerge --unmerge 'net-im/tmsnc'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 35916 (gentoo_GLSA-200903-26.nasl)
CVE ID: CVE-2008-2828