How to Buy
This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
libsoup is an HTTP client/library implementation for GNOME.
A directory traversal flaw was found in libsoup's SoupServer. If an
application used SoupServer to implement an HTTP service, a remote
attacker who is able to connect to that service could use this flaw to
access any local files accessible to that application via a specially
crafted request. (CVE-2011-2524)
All users of libsoup should upgrade to these updated packages, which
contain a backported patch to resolve this issue. All running
applications using libsoup's SoupServer must be restarted for the
update to take effect.
See also :
Update the affected libsoup, libsoup-debuginfo and / or libsoup-devel
Risk factor :
Medium / CVSS Base Score : 5.0
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 61102 ()
CVE ID: CVE-2011-2524
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.