How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
An updated mc package that resolves several shell escape security
issues is now available.
[Updated 5 January 2005] Packages have been updated to include the gmc
and mcserv packages which were left out of the initial errata.
Midnight Commander (mc) is a visual shell much like a file manager.
Shell escape bugs have been discovered in several of the mc vfs
backend scripts. An attacker who is able to influence a victim to open
a specially crafted URI using mc could execute arbitrary commands as
the victim. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0494 to this issue.
Users of mc should upgrade to this updated package which contains
backported patches and is not vulnerable to this issue.
See also :
Update the affected gmc, mc and / or mcserv packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 14740 ()
CVE ID: CVE-2004-0494
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.