This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote SuSE 10 host is missing a security-related patch.
This update fixes a bug in ssh's cookie handling code. It does not
properly handle the situation when an untrusted cookie cannot be
created and uses a trusted X11 cookie instead. This allows attackers
to violate the intended policy and gain privileges by causing an X
client to be treated as trusted. (CVE-2007-4752) Additionally this
update fixes a bug introduced with the last security update for
openssh. When the SSH daemon wrote to stderr (for instance, to warn
about the presence of a deprecated option like
PAMAuthenticationViaKbdInt in its configuration file), SIGALRM was
blocked for SSH sessions. This resulted in problems with processes
which rely on SIGALRM, such as ntpdate.
See also :
Apply ZYPP patch number 4580.
Risk factor :
High / CVSS Base Score : 7.5