RHEL 2.1 : gdm (RHSA-2003:259)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated GDM packages are available which correct a local crash if
XDMCP is enabled.

GDM is the GNOME Display Manager for X.

Two bugs have been found in the X Display Manager Control Protocol
(XDMCP) which could allow a denial of service attack (DoS) by crashing
the gdm daemon. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2003-0548 and CVE-2003-0549
to these issues.

This attack is only possible if XDMCP is enabled. XDMCP is not enabled
by default in Red Hat Enterprise Linux distributions. In addition is
documented best practise that XDMCP should only ever be run on trusted
networks.

Users of XDMCP in GDM should upgrade to these erratum packages which
contain backported security fixes are are not vulnerable to these
issues.

Note that Red Hat Enterprise Linux 2.1 is not vulnerable to
CVE-2003-0547, a vulnerability that allows a local user to read any
text file, as it did not have the 'examine session errors' feature.

See also :

https://www.redhat.com/security/data/cve/CVE-2003-0548.html
https://www.redhat.com/security/data/cve/CVE-2003-0549.html
http://rhn.redhat.com/errata/RHSA-2003-259.html

Solution :

Update the affected gdm package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12416 ()

Bugtraq ID:

CVE ID: CVE-2003-0548
CVE-2003-0549