This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A heap-based buffer overflow flaw was found in the way NSS parsed
certain ASN.1 structures. An attacker could use this flaw to create a
specially crafted certificate which, when parsed by NSS, could cause
it to crash, or execute arbitrary code, using the permissions of the
user running an application compiled against the NSS library.
For the update to take effect, all applications linked to the nss and
nss- util library must be restarted, or the system rebooted.
See also :
Update the affected nss-util, nss-util-debuginfo and / or
Risk factor :
Medium / CVSS Base Score : 6.8