How to Buy
This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote Slackware host is missing a security update.
An integer overflow in the xdrmem_getbytes() function found in the
glibc library has been fixed. This could allow a remote attacker to
execute arbitrary code by exploiting RPC service that use
xdrmem_getbytes(). None of the default RPC services provided by
Slackware appear to use this function, but third-party applications
may make use of it. We recommend upgrading to these new glibc
See also :
Update the affected packages.
Risk factor :
Family: Slackware Local Security Checks
Nessus Plugin ID: 37391 ()
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.