How to Buy
This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing a security update.
The coreutils packages were found to not use the pam_succeed_if
Pluggable Authentication Module (PAM) correctly in the configuration
file for the 'su' command. Any local user could use this command to
change to a locked or expired user account if the target account's
password was known to the user running 'su'. These updated packages,
correctly, only allow the root user to switch to locked or expired
accounts using 'su'. (CVE-2008-1946)
See also :
Update the affected coreutils package.
Risk factor :
Medium / CVSS Base Score : 4.4
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60450 ()
CVE ID: CVE-2008-1946
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.