This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing a security update.
The coreutils packages were found to not use the pam_succeed_if
Pluggable Authentication Module (PAM) correctly in the configuration
file for the 'su' command. Any local user could use this command to
change to a locked or expired user account if the target account's
password was known to the user running 'su'. These updated packages,
correctly, only allow the root user to switch to locked or expired
accounts using 'su'. (CVE-2008-1946)
See also :
Update the affected coreutils package.
Risk factor :
Medium / CVSS Base Score : 4.4