This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201702-02
(RTMPDump: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in RTMPDump.
The following is a list of vulnerabilities fixed:
Additional decode input size checks
Ignore zero-length packets
Potential integer overflow in RTMPPacket_Alloc().
Obsolete RTMPPacket_Free() call left over from original C++ to C
AMFProp_GetObject must make sure the prop is actually an object
A remote attacker could entice a user to open a specially crafted media
flash file using RTMPDump. This could possibly result in the execution of
arbitrary code with the privileges of the process or a Denial of Service
There is no known workaround at this time.
See also :
All RTMPDump users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now