Fedora 8 : scponly-4.6-10.fc8 (2008-1743)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

- Wed Feb 13 2008 Tomas Hoger <thoger at redhat.com> -
4.6-10

- Add patch to prevent restriction bypass using
OpenSSH's scp options -F and -o (CVE-2007-6415,
#426072)

- Mon Feb 11 2008 Warren Togami <wtogami at redhat.com> -
4.6-9

- rebuild with gcc-4.3

- Tue Dec 11 2007 Toshio Kuratomi <a.badger at
gmail.com> - 4.6-8

- Disable rsync support due to security concerns: RH
BZ#418201

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=418201
https://bugzilla.redhat.com/show_bug.cgi?id=426072
http://www.nessus.org/u?911691fe

Solution :

Update the affected scponly package.

Risk factor :

High / CVSS Base Score : 8.5
(CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 31108 (fedora_2008-1743.nasl)

Bugtraq ID: 26900

CVE ID: CVE-2007-6350
CVE-2007-6415

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now