Scientific Linux Security Update : gnutls on SL5.x i386/x86_64

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

Flaws were found in the way GnuTLS handles malicious client
connections. A malicious remote client could send a specially crafted
request to a service using GnuTLS that could cause the service to
crash. (CVE-2008-1948, CVE-2008-1949, CVE-2008-1950)

At this time we have not seen any code that is using this exploit. But
in Scientific Linux 5 there are some applications, such as CUPS, that
would be directly vulnerable if/when there is an exploit. Because of
the potential threat we are labeling this critical.

See also :

Solution :

Update the affected gnutls, gnutls-devel and / or gnutls-utils

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60401 ()

Bugtraq ID:

CVE ID: CVE-2008-1948

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now