This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated devtoolset-2-httpcomponents-client packages that fix one
security issue are now available for Red Hat Developer Toolset 2.
Red Hat Product Security has rated this update as having Important
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.
HttpClient is an HTTP/1.1 compliant HTTP agent implementation based on
It was discovered that the HttpClient incorrectly extracted host name
from an X.509 certificate subject's Common Name (CN) field. A
man-in-the-middle attacker could use this flaw to spoof an SSL server
using a specially crafted X.509 certificate. (CVE-2012-6153)
This issue was discovered by Florian Weimer of Red Hat Product
For additional information on this flaw, refer to the Knowledgebase
article in the References section.
All devtoolset-2-httpcomponents-client users are advised to upgrade to
these updated packages, which contain a backported patch to correct
See also :
Update the affected devtoolset-2-httpcomponents-client and / or
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true