GLSA-200509-08 : Python: Heap overflow in the included PCRE library

This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200509-08
(Python: Heap overflow in the included PCRE library)

The 're' Python module makes use of a private copy of libpcre
which is subject to an integer overflow leading to a heap overflow (see
GLSA 200508-17).

Impact :

An attacker could target a Python-based web application (or SUID
application) that would use untrusted data as regular expressions,
potentially resulting in the execution of arbitrary code (or privilege
escalation).

Workaround :

Python users that don't run any Python web application or SUID
application (or that run one that wouldn't use untrusted inputs as
regular expressions) are not affected by this issue.

See also :

http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml
http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml

Solution :

All Python users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-lang/python-2.3.5-r2'

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:ND)
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 19687 (gentoo_GLSA-200509-08.nasl)

Bugtraq ID: 14620

CVE ID: CVE-2005-2491