This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated glibc packages are available to fix a buffer overflow in the
The GNU C library package, glibc, contains standard libraries used by
multiple programs on the system.
A read buffer overflow vulnerability exists in the glibc resolver code
in versions of glibc up to and including 2.2.5. The vulnerability is
triggered by DNS packets larger than 1024 bytes and can cause
applications to crash.
In addition to this, several non-security related bugs have been
fixed, the majority for the Itanium (IA64) platform.
All Red Hat Linux Advanced Server users are advised to upgrade to
these errata packages which contain a patch to correct this
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12354 ()
CVE ID: CVE-2002-1146
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.