This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
Flaws were found in the way GnuTLS handles malicious client
connections. A malicious remote client could send a specially crafted
request to a service using GnuTLS that could cause the service to
crash. (CVE-2008-1948, CVE-2008-1949, CVE-2008-1950)
At this time we have not seen any code that is using this exploit. But
in Scientific Linux 5 there are some applications, such as CUPS, that
would be directly vulnerable if/when there is an exploit. Because of
the potential threat we are labeling this critical.
See also :
Update the affected gnutls, gnutls-devel and / or gnutls-utils
Risk factor :
Critical / CVSS Base Score : 10.0