This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
These new kernel packages contain fixes for the following security
- A flaw was found in the backported stack unwinder fixes
in Red Hat Enterprise Linux 5. On AMD64 and Intel 64
platforms, a local user could trigger this flaw and
cause a denial of service. (CVE-2007-4574, Important)
- A flaw was found in the handling of process death
signals. This allowed a local user to send arbitrary
signals to the suid-process executed by that user. A
successful exploitation of this flaw depends on the
structure of the suid-program and its signal handling.
- A flaw was found in the Distributed Lock Manager (DLM)
in the cluster manager. This allowed a remote user who
is able to connect to the DLM port to cause a denial of
service. (CVE-2007-3380, Important)
- A flaw was found in the aacraid SCSI driver. This
allowed a local user to make ioctl calls to the driver
which should otherwise be restricted to privileged
users. (CVE-2007-4308, Moderate)
- A flaw was found in the prio_tree handling of the
hugetlb support that allowed a local user to cause a
denial of service. This only affected kernels with
hugetlb support. (CVE-2007-4133, Moderate)
- A flaw was found in the eHCA driver on PowerPC
architectures that allowed a local user to access 60k of
physical address space. This address space could contain
sensitive information. (CVE-2007-3850, Moderate)
- A flaw was found in ptrace support that allowed a local
user to cause a denial of service via a NULL pointer
dereference. (CVE-2007-3731, Moderate)
- A flaw was found in the usblcd driver that allowed a
local user to cause a denial of service by writing data
to the device node. To exploit this issue, write access
to the device node was needed. (CVE-2007-3513, Moderate)
- A flaw was found in the random number generator
implementation that allowed a local user to cause a
denial of service or possibly gain privileges. If the
root user raised the default wakeup threshold over the
size of the output pool, this flaw could be exploited.
In addition to the security issues described above, several bug fixes
preventing possible system crashes and data corruption were also
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60272 ()
CVE ID: CVE-2007-3105CVE-2007-3380CVE-2007-3513CVE-2007-3731CVE-2007-3848CVE-2007-3850CVE-2007-4133CVE-2007-4308CVE-2007-4574
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.