This script is Copyright (C) 2005-2017 Tenable Network Security, Inc.
The remote chat server is affected by a format string vulnerability.
According to its banner, the version of the ngIRCd chat service
running on the remote host contains a format string vulnerability. If
it was compiled with IDENT, DEBUG is enabled, and it's logging to
SYSLOG, a remote attacker can leverage this issue to execute arbitrary
code on the remote host subject to the privileges under which the
service operates, which is 'root' by default.
See also :
Upgrade to ngIRCd 0.8.3 or later.
Risk factor :
High / CVSS Base Score : 7.6
CVSS Temporal Score : 7.2
Public Exploit Available : true