This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Slackware host is missing a security update.
New PCRE packages are available for Slackware 8.1, 9.0, 9.1, 10.0,
10.1, and -current to fix a security issue. A buffer overflow could be
triggered by a specially crafted regular expression. Any applications
that use PCRE to process untrusted regular expressions may be
exploited to run arbitrary code as the user running the application.
The PCRE library is also provided in an initial installation by the
aaa_elflibs package, so if your system has a /usr/lib/libpcre.so.0
symlink, then you should install this updated package even if the PCRE
package itself is not installed on the system.
See also :
Update the affected pcre package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false
Family: Slackware Local Security Checks
Nessus Plugin ID: 19858 ()
CVE ID: CVE-2005-2491
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.