This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
A remotely exploitable vulnerability was discovered in the Socks-5
proxy code in XChat. By default, socks5 traversal is disabled, and one
would also need to connect to an attacker's own custom proxy server in
order for this to be exploited. Successful exploitation could lead to
arbitrary code execution as the user running XChat.
The provided packages are patched to prevent this problem.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5