This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated pcre packages are now available to correct a security issue.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team
PCRE is a Perl-compatible regular expression library.
An integer overflow flaw was found in PCRE, triggered by a maliciously
crafted regular expression. On systems that accept arbitrary regular
expressions from untrusted users, this could be exploited to execute
arbitrary code with the privileges of the application using the
library. The Common Vulnerabilities and Exposures project assigned the
name CVE-2005-2491 to this issue.
The security impact of this issue varies depending on the way that
applications make use of PCRE. For example, the Apache web server uses
the system PCRE library in order to parse regular expressions, but
this flaw would only allow a user who already has the ability to write
.htaccess files to gain 'apache' privileges. For applications supplied
with Red Hat Enterprise Linux, a maximum security impact of moderate
has been assigned.
Users should update to these erratum packages that contain a
backported patch to correct this issue.
See also :
Update the affected pcre and / or pcre-devel packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 19675 ()
Bugtraq ID: 14620
CVE ID: CVE-2005-2491
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.