RHEL 3 : glibc (RHSA-2003:334)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated glibc packages that resolve a vulnerability and address
several bugs are now available.

The glibc packages contain GNU libc, which provides standard system

Herbert Xu reported that various applications can accept spoofed
messages sent on the kernel netlink interface by other users on the
local machine. This could lead to a local denial of service attack.
The glibc function getifaddrs uses netlink and could therefore be
vulnerable to this issue. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2003-0859 to this

In addition to the security issues, a number of other bugs were fixed.

Users are advised to upgrade to these erratum packages, which contain
a patch that checks that netlink messages actually came from the
kernel and patches for the various bug fixes.

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.9

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12434 ()

Bugtraq ID:

CVE ID: CVE-2003-0859

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now