This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A remote format string vulnerability was found in the libgtop daemon
by Laboratory intexxia. By sending a specially crafted format string
to the server, a remote attacker could potentially execute arbitrary
code on the remote system with the daemon's permissions. By default
libgtop runs as the user nobody, but the flaw could be used to
compromise local system security by allowing the attacker to exploit
other local vulnerabilities. A buffer overflow was also found by
Flavio Veloso which could allow the client to execute code on the
server. Both vulnerabilities are patched in this update and will be
fixed upstream in version 1.0.14. libgtop_daemon is not invoked by
default anywhere in Mandrake Linux.
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false