This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
Flaws were found in the way GnuTLS handles malicious client
connections. A malicious remote client could send a specially crafted
request to a service using GnuTLS that could cause the service to
crash. (CVE-2008-1948, CVE-2008-1949, CVE-2008-1950)
At this time we have not seen any code that is using this exploit. But
in Scientific Linux 5 there are some applications, such as CUPS, that
would be directly vulnerable if/when there is an exploit. Because of
the potential threat we are labeling this critical.
See also :
Update the affected gnutls, gnutls-devel and / or gnutls-utils
Risk factor :
Critical / CVSS Base Score : 10.0