RHEL 2.1 : gdm (RHSA-2003:259)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated GDM packages are available which correct a local crash if
XDMCP is enabled.

GDM is the GNOME Display Manager for X.

Two bugs have been found in the X Display Manager Control Protocol
(XDMCP) which could allow a denial of service attack (DoS) by crashing
the gdm daemon. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2003-0548 and CVE-2003-0549
to these issues.

This attack is only possible if XDMCP is enabled. XDMCP is not enabled
by default in Red Hat Enterprise Linux distributions. In addition is
documented best practise that XDMCP should only ever be run on trusted

Users of XDMCP in GDM should upgrade to these erratum packages which
contain backported security fixes are are not vulnerable to these

Note that Red Hat Enterprise Linux 2.1 is not vulnerable to
CVE-2003-0547, a vulnerability that allows a local user to read any
text file, as it did not have the 'examine session errors' feature.

See also :


Solution :

Update the affected gdm package.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12416 ()

Bugtraq ID: 8470

CVE ID: CVE-2003-0548

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now