RHEL 3 : glibc (RHSA-2003:334)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated glibc packages that resolve a vulnerability and address
several bugs are now available.

The glibc packages contain GNU libc, which provides standard system

Herbert Xu reported that various applications can accept spoofed
messages sent on the kernel netlink interface by other users on the
local machine. This could lead to a local denial of service attack.
The glibc function getifaddrs uses netlink and could therefore be
vulnerable to this issue. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2003-0859 to this

In addition to the security issues, a number of other bugs were fixed.

Users are advised to upgrade to these erratum packages, which contain
a patch that checks that netlink messages actually came from the
kernel and patches for the various bug fixes.

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.9

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12434 ()

Bugtraq ID:

CVE ID: CVE-2003-0859

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial