Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-268: up

Vulnerability Assessment Details

RHSA-2003-268: up

Vulnerability Assessment Summary
Check for the version of the up packages

Detailed Explanation for this Vulnerability Assessment

New versions of the up2date and rhn_register clients are available and
are required for continued access to Red Hat Network.

The rhn_register and up2date packages contain the software necessary to
take advantage of Red Hat Network functionality.

This erratum includes an updated RHNS-CA-CERT file, which contains a new CA
certificate. This new certificate is needed so that up2date can continue
to communicate with Red Hat Network after 28 August 2003. Without this
updated certificate, users will see SSL Connection Errors reported by
up2date or rhn_register.

All users must upgrade to these erratum packages in order to continue to
use Red Hat Network. This includes both interactive use of up2date, as
well as actions scheduled by the RHN website.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Dell PowerConnect 2848 48-Port Gigabit Network Switch + 4 SFP
Dell PowerConnect 2848 48-Port Gigabit Network Switch + 4 SFP pictureLot of 7 Cisco WS-C3560-48PS-S 48 Ports Layer 3 PoE Switch
Lot of 7 Cisco WS-C3560-48PS-S 48 Ports Layer 3 PoE Switch  picture24 Port Gigabit Smart Switch
24 Port Gigabit Smart Switch picture8 Port Gigabit Smart Switch
8 Port Gigabit Smart Switch picture


No Discussions have been posted on this vulnerability.