This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201204-05
(SWFTools: User-assisted execution of arbitrary code)
Integer overflow errors in the 'getPNG()' function in png.c and the
'jpeg_load()' function in jpeg.c could cause a heap-based buffer
A remote attacker could entice a user to open a specially crafted PNG or
JPEG file, possibly resulting in execution of arbitrary code with the
privileges of the process, or a Denial of Service condition.
There is no known workaround at this time.
See also :
Gentoo discontinued support for SWFTools. We recommend that users
# emerge --unmerge 'media-gfx/swftools'
NOTE: Users could upgrade to '>=media-gfx/swftools-0.9.1', however
these packages are not currently stable.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false