Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-177: rhn_register

Vulnerability Assessment Details

RHSA-2003-177: rhn_register

Vulnerability Assessment Summary
Check for the version of the rhn_register packages

Detailed Explanation for this Vulnerability Assessment

Updated versions of the rhn_register and up2date packages are now
available. The new packages include many bug fixes, and a few new features.

The rhn_register and up2date packages contain the software necessary to
take advantage of Red Hat Network functionality.

The up2date package incorporates improvements in handling package
dependencies and "obsoletes" processing, along with many other bug fixes.

This release also includes an updated RHNS-CA-CERT file, which contains an
additional CA certificate. This is needed so that up2date can continue to
communicate with Red Hat Network once the current CA certificate reaches
its August 2003 expiration date.

All users of Red Hat Network should therefore upgrade to these erratum

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

ASUS N551JK GL551JM N551JM G551JK N551JX i7 GTX850M Motherboard
 ASUS N551JK GL551JM N551JM G551JK N551JX i7 GTX850M Motherboard  picture1PC 100% TEST IFC03 / D0IFC03-01 (by EMS or DHL ) #GY008
1PC 100%  TEST   IFC03 / D0IFC03-01    (by EMS or DHL ) #GY008 pictureSupermicro CSE-SATA-933 Server Serial ATA backplane
Supermicro CSE-SATA-933 Server Serial ATA backplane picture


No Discussions have been posted on this vulnerability.