This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing a security update.
Tavis Ormandy of the Gentoo Security Project discovered a
vulnerability in zlib where a certain data stream would cause zlib to
corrupt a data structure, resulting in the linked application to dump
Markus Oberhumber discovered additional ways that a specially crafted
compressed stream could trigger an overflow. An attacker could create
such a stream that would cause a linked application to crash if opened
by a user (CVE-2005-1849).
Both of these issues have previously been fixed in zlib, but sash
links statically against zlib and is thus also affected by these
issues. New sash packages are available that link against the updated
Update the affected sash package.
Risk factor :
High / CVSS Base Score : 7.5