Fedora 13 : glpi-0.72.4-2.svn11035.fc13 (2010-5068)

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

This version correct several bugs. Full upstream changelog : * Bug
#1893: Unable to access to the model of phones dictionnary * Bug
#1904: Vlan not add using Template * Bug #1906: Message-ID should not
use $SERVER['HTTPHOST'] * Bug #1918: configured listlimitmax not
honnoured * Bug #1941: Disconnecting a port doesn't free the network
point. * Bug #1942: onglet Tous d'un objet * Bug #1946: Business rules
bug on test processing * Bug #1963: expired license for deleted
software * Bug #1969: bandwidth / speed confusion * Bug #1971: Report
by year for software * Bug #2017: Wrong ID for Export ICAL / Webcal *
Bug #2030: Search engine problem : user in lists * Bug #2034:
Interface helpdesk - ticket details - navigation problem * Bug #2035:
Search on warranty date * Bug #2036: Report infocom display improvment
* Bug #2039: OCS manual import do not use link processing * Bug #2042:
Security Problem - root_doc computation * Bug #2043: Security : clean
$SERVER['PHPSELF'] REQUEST_URI... * Bug #2056: LDAP Group retrieval
for external auth * XSS vulnerability in embedded phpCAS

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=575904
http://www.nessus.org/u?9a24af90

Solution :

Update the affected glpi package.

Risk factor :

High

Family: Fedora Local Security Checks

Nessus Plugin ID: 47377 (fedora_2010-5068.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now