Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Gentoo Security Advisory GLSA 201009-04 (SARG sarg)
Information
Severity
Severity
Critical
Family
Family
Gentoo Local Security Checks
CVSSv2 Base
CVSSv2 Base
10.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
13 years ago
Modified
Modified
5 years ago
Summary
The remote host is missing updates announced in advisory GLSA 201009-04.
Insight
Insight
Multiple stack-based buffer overflow vulnerabilities were discovered in SARG allowing for remote code execution.
Solution
Solution
All SARG users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-analyzer/sarg-2.2.5-r5'