Scientific Linux Security Update : libtirpc on SL6.x i386/srpm/x86_64

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A flaw was found in the way libtirpc decoded RPC requests. A
specially- crafted RPC request could cause libtirpc to attempt to free
a buffer provided by an application using the library, even when the
buffer was not dynamically allocated. This could cause an application
using libtirpc, such as rpcbind, to crash. (CVE-2013-1950)

All running applications using libtirpc must be restarted for the
update to take effect.

See also :

Solution :

Update the affected libtirpc, libtirpc-debuginfo and / or
libtirpc-devel packages.

Risk factor :

Medium / CVSS Base Score : 4.3

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 66709 ()

Bugtraq ID:

CVE ID: CVE-2013-1950

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now