How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
Flaws were found in the way GnuTLS handles malicious client
connections. A malicious remote client could send a specially crafted
request to a service using GnuTLS that could cause the service to
crash. (CVE-2008-1948, CVE-2008-1949, CVE-2008-1950)
At this time we have not seen any code that is using this exploit. But
in Scientific Linux 5 there are some applications, such as CUPS, that
would be directly vulnerable if/when there is an exploit. Because of
the potential threat we are labeling this critical.
See also :
Update the affected gnutls, gnutls-devel and / or gnutls-utils
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60401 ()
CVE ID: CVE-2008-1948CVE-2008-1949CVE-2008-1950
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.