This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201111-06
(MaraDNS: Arbitrary code execution)
A long DNS hostname with a large number of labels could trigger a buffer
overflow in the compress_add_dlabel_points() function of dns/Compress.c.
A remote unauthenticated attacker could execute arbitrary code or cause
a Denial of Service.
There is no known workaround at this time.
See also :
All MaraDNS users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-dns/maradns-1.4.06'
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since February 12, 2011. It is likely that your system is
already no longer affected by this issue.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false