RHEL 2.1 / 3 / 4 : pcre (RHSA-2005:761)

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated pcre packages are now available to correct a security issue.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team

PCRE is a Perl-compatible regular expression library.

An integer overflow flaw was found in PCRE, triggered by a maliciously
crafted regular expression. On systems that accept arbitrary regular
expressions from untrusted users, this could be exploited to execute
arbitrary code with the privileges of the application using the
library. The Common Vulnerabilities and Exposures project assigned the
name CVE-2005-2491 to this issue.

The security impact of this issue varies depending on the way that
applications make use of PCRE. For example, the Apache web server uses
the system PCRE library in order to parse regular expressions, but
this flaw would only allow a user who already has the ability to write
.htaccess files to gain 'apache' privileges. For applications supplied
with Red Hat Enterprise Linux, a maximum security impact of moderate
has been assigned.

Users should update to these erratum packages that contain a
backported patch to correct this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2005-2491.html
http://rhn.redhat.com/errata/RHSA-2005-761.html

Solution :

Update the affected pcre and / or pcre-devel packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:ND)
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 19675 ()

Bugtraq ID: 14620

CVE ID: CVE-2005-2491