This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
During a security audit, a stack-based buffer overflow flaw was found
in the PAM authentication code in the OpenPegasus CIM management
server. An unauthenticated remote user could trigger this flaw and
potentially execute arbitrary code with root privileges.
Users of tog-pegasus should upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing the
updated packages the tog-pegasus service should be restarted.
See also :
Update the affected tog-pegasus, tog-pegasus-devel and / or
Risk factor :
Critical / CVSS Base Score : 10.0
Public Exploit Available : true
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60341 ()
CVE ID: CVE-2008-0003
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.