Scientific Linux Security Update : sos on SL5.x (noarch)

Medium Nessus Plugin ID 69167


The remote Scientific Linux host is missing a security update.


The sosreport utility collected the Kickstart configuration file ('/root /anaconda-ks.cfg'), but did not remove the root user's password from it before adding the file to the resulting archive of debugging information. An attacker able to access the archive could possibly use this flaw to obtain the root user's password.
'/root/anaconda-ks.cfg' usually only contains a hash of the password, not the plain text password. (CVE-2012-2664)

Note: This issue affected all installations, not only systems installed via Kickstart. A '/root/anaconda-ks.cfg' file is created by all installation types.

The utility also collects yum repository information from '/etc/yum.repos.d' which in uncommon configurations may contain passwords. Any http_proxy password specified in these files will now be automatically removed. Passwords embedded within URLs in these files should be manually removed or the files excluded from the archive.


Update the affected sos package.

See Also

Plugin Details

Severity: Medium

ID: 69167

File Name: sl_20130730_sos_on_SL5_x.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2013/07/31

Updated: 2018/12/31

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/07/30

Reference Information

CVE: CVE-2012-2664