Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-259: gdm

Vulnerability Assessment Details

RHSA-2003-259: gdm

Vulnerability Assessment Summary
Check for the version of the gdm packages

Detailed Explanation for this Vulnerability Assessment

Updated GDM packages are available which correct a local crash if XDMCP is

GDM is the GNOME Display Manager for X.

Two bugs have been found in the X Display Manager Control Protocol (XDMCP)
which could permit a denial of service attack (DoS) by crashing the gdm
daemon. The Common Vulnerabilities and Exposures project (
has assigned the names CVE-2003-0548 and CVE-2003-0549 to these issues.

This attack is only possible if XDMCP is enabled. XDMCP is not enabled by
default in Red Hat Enterprise Linux distributions. In addition is
documented best practise that XDMCP should only ever be run on trusted

Users of XDMCP in GDM should upgrade to these erratum packages which
contain backported security fixes are are not vulnerable to these issues.

Note that Red Hat Enterprise Linux 2.1 is not vulnerable to CVE-2003-0547,
a vulnerability that permits a local user to read any text file, as it did
not have the "examine session errors" feature.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Apple MacBook Air 13.3" Laptop - MD226LL/A - 1.8 GHz Core i7 4GB RAM YT63
Apple MacBook Air 13.3Apple iMac 21.5" Desktop - MD093LL/A - 2.7 GHz Core i5 8GB RAM 1TB HDD - NT33
Apple iMac 21.5MacBook Air Core i5 1.7GHz 4GB RAM 13" Mid-2011 broken (PLEASE READ)
MacBook Air Core i5 1.7GHz 4GB RAM 13Dell PowerEdge 1950 1U Server 2xQuad-Core Xeon 3.0GHz + 48GB RAM + 4x500GB RAID
Dell PowerEdge 1950 1U Server 2xQuad-Core Xeon 3.0GHz + 48GB RAM + 4x500GB RAID picture


No Discussions have been posted on this vulnerability.