How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated GDM packages are available which correct a local crash if
XDMCP is enabled.
GDM is the GNOME Display Manager for X.
Two bugs have been found in the X Display Manager Control Protocol
(XDMCP) which could allow a denial of service attack (DoS) by crashing
the gdm daemon. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2003-0548 and CVE-2003-0549
to these issues.
This attack is only possible if XDMCP is enabled. XDMCP is not enabled
by default in Red Hat Enterprise Linux distributions. In addition is
documented best practise that XDMCP should only ever be run on trusted
Users of XDMCP in GDM should upgrade to these erratum packages which
contain backported security fixes are are not vulnerable to these
Note that Red Hat Enterprise Linux 2.1 is not vulnerable to
CVE-2003-0547, a vulnerability that allows a local user to read any
text file, as it did not have the 'examine session errors' feature.
See also :
Update the affected gdm package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12416 ()
Bugtraq ID: 8470
CVE ID: CVE-2003-0548CVE-2003-0549
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.