RHEL 7 : rest (RHSA-2015:2237)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated rest packages that fix one security issue are now available
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Low security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in
the References section.

The rest library was designed to make it easier to access web services
that claim to be RESTful. A RESTful service should have URLs that
represent remote objects, which methods can then be called on.

It was found that the OAuth implementation in librest, a helper
library for RESTful services, incorrectly truncated the pointer
returned by the rest_proxy_call_get_url call. An attacker could use
this flaw to crash an application using the librest library.
(CVE-2015-2675)

All users of rest are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After
installing the update, all applications using librest must be
restarted for the update to take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2015-2675.html
http://rhn.redhat.com/errata/RHSA-2015-2237.html

Solution :

Update the affected rest, rest-debuginfo and / or rest-devel packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 3.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 86977 ()

Bugtraq ID:

CVE ID: CVE-2015-2675

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now