RHEL 2.1 / 3 / 4 : sysreport (RHSA-2005:502)

High Nessus Plugin ID 18474


The remote Red Hat host is missing a security update.


An updated sysreport package that fixes an information disclosure flaw is now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team

Sysreport is a utility that gathers information about a system's hardware and configuration. The information can then be used for diagnostic purposes and debugging.

When run by the root user, sysreport includes the contents of the /etc/sysconfig/rhn/up2date configuration file. If up2date has been configured to connect to a proxy server that requires an authentication password, that password is included in plain text in the system report. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-1760 to this issue.

Users of sysreport should update to this erratum package, which contains a patch that removes any proxy authentication passwords.


Update the affected sysreport package.

See Also



Plugin Details

Severity: High

ID: 18474

File Name: redhat-RHSA-2005-502.nasl

Version: $Revision: 1.19 $

Type: local

Agent: unix

Published: 2005/06/13

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:sysreport, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2005/06/13

Vulnerability Publication Date: 2005/06/13

Reference Information

CVE: CVE-2005-1760

OSVDB: 17302

RHSA: 2005:502