openSUSE Security Update : pcre (openSUSE-2015-353)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

The regular expression library pcre was updated to 8.37 to fix three
security issues and a number of bugs and correctness issues.

The following vulnerabilities were fixed :

- CVE-2015-2325: Specially crafted regular expressions
could have caused a heap buffer overlow in
compile_branch(), potentially allowing the execution of
arbitrary code. (boo#924960)

- CVE-2015-2326: Specially crafted regular expressions
could have caused a heap buffer overlow in
pcre_compile2(), potentially allowing the execution of
arbitrary code. [boo#924961]

- CVE-2014-8964: Specially crafted regular expression
could have caused a denial of service (crash) or have
other unspecified impact. [boo#906574]

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=906574
https://bugzilla.opensuse.org/show_bug.cgi?id=924960
https://bugzilla.opensuse.org/show_bug.cgi?id=924961

Solution :

Update the affected pcre packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 83392 ()

Bugtraq ID:

CVE ID: CVE-2014-8964
CVE-2015-2325
CVE-2015-2326

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now