RHEL 2.1 : glibc (RHSA-2004:383)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated glibc packages that fix a security flaw in the resolver as
well as dlclose handling are now available.

The GNU libc packages (known as glibc) contain the standard C
libraries used by applications.

A security audit of the glibc packages in Red Hat Enterprise Linux 2.1
found a flaw in the resolver library which was originally reported as
affecting versions of ISC BIND 4.9. This flaw also applied to glibc
versions before 2.3.2. An attacker who is able to send DNS responses
(perhaps by creating a malicious DNS server) could remotely exploit
this vulnerability to execute arbitrary code or cause a denial of
service. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2002-0029 to this issue.

These updated packages also fix a dlclose function bug on certain
shared libraries, which caused program crashes.

All users of glibc should upgrade to these updated packages, which
resolve these issues.

See also :


Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: Red Hat Local Security Checks

Nessus Plugin ID: 14212 ()

Bugtraq ID:

CVE ID: CVE-2002-0029

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now