How to Buy
This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated w3c-libwww packages that fix a security issue and a bug are
This update has been rated as having low security impact by the Red
Hat Security Response Team.
w3c-libwww is a general-purpose web library.
Several buffer overflow flaws in w3c-libwww were found. If a client
application that uses w3c-libwww connected to a malicious HTTP server,
it could trigger an out of bounds memory access, causing the client
application to crash (CVE-2005-3183).
This updated version of w3c-libwww also fixes an issue when computing
MD5 sums on a 64 bit machine.
Users of w3c-libwww should upgrade to these updated packages, which
contain backported patches to correct these issues.
See also :
Update the affected w3c-libwww, w3c-libwww-apps and / or
Risk factor :
Medium / CVSS Base Score : 4.3
Family: Red Hat Local Security Checks
Nessus Plugin ID: 25136 ()
CVE ID: CVE-2005-3183
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.