This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200504-05
(Gaim: Denial of Service issues)
Multiple vulnerabilities have been addressed in the latest release of
A buffer overread in the gaim_markup_strip_html() function,
which is used when logging conversations (CAN-2005-0965).
Markup tags are improperly escaped using Gaim's IRC plugin
Sending a specially crafted file transfer request to a Gaim Jabber
user can trigger a crash (CAN-2005-0967).
An attacker could possibly cause a Denial of Service by exploiting any
of these vulnerabilities.
There is no known workaround at this time.
See also :
All Gaim users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-im/gaim-1.2.1'
Risk factor :
Medium / CVSS Base Score : 6.4