Scientific Linux Security Update : dhcp on SL4.x,SL5.x,SL6.x i386/x86_64

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

It was discovered that the DHCP client daemon, dhclient, did not
sufficiently sanitize certain options provided in DHCP server replies,
such as the client hostname. A malicious DHCP server could send such
an option with a specially crafted value to a DHCP client. If this
option's value was saved on the client system, and then later
insecurely evaluated by a process that assumes the option is trusted,
it could lead to arbitrary code execution with the privileges of that
process. (CVE-2011-0997)

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
Public Exploit Available : true

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 61014 ()

Bugtraq ID:

CVE ID: CVE-2011-0997

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now