Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67900
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2010:0657
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2010:0657.

The GNOME Display Manager (GDM) is a configurable re-implementation of XDM,
the X Display Manager. GDM allows you to log in to your system with the X
Window System running, and supports running several different X sessions on
your local machine at the same time.

A flaw was found in the way the gdm package was built. The gdm package was
missing TCP wrappers support on 64-bit platforms, which could result in an
administrator believing they had access restrictions enabled when they did
not. (CVE-2007-5079)

Solution:
All users should upgrade to this updated package, which contains backported
patches to correct these issues. GDM must be restarted for this update to
take effect. Rebooting achieves this, but changing the runlevel from 5 to 3
and back to 5 also restarts GDM.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2010-0657.html
http://www.redhat.com/security/updates/classification/#low

Risk factor : High

CVSS Score:
6.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-5079
RHSA-2010:0657
http://www.redhat.com/support/errata/RHSA-2010-0657.html
https://bugzilla.redhat.com/show_bug.cgi?id=181302
rhel-tcpwrapper-security-bypass(36791)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36791
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.