This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A use-after-free flaw related to the PMAP_CALLIT operation and TCP/UDP
connections was discovered in rpcbind. A remote attacker could
possibly exploit this flaw to crash the rpcbind service by performing
a series of UDP and TCP calls. (CVE-2015-7236)
If the rpcbind service is running, it will be automatically restarted
after installing this update.
See also :
Update the affected rpcbind and / or rpcbind-debuginfo packages.
Risk factor :
Medium / CVSS Base Score : 5.0