Mandriva Linux Security Advisory : pcre (MDVSA-2008:147)

High Nessus Plugin ID 36245


The remote Mandriva Linux host is missing one or more security updates.


Tavis Ormandy of the Google Security Team discovered a heap-based buffer overflow when compiling certain regular expression patterns.
This could be used by a malicious attacker by sending a specially crafted regular expression to an application using the PCRE library, resulting in the possible execution of arbitrary code or a denial of service (CVE-2008-2371).

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: High

ID: 36245

File Name: mandriva_MDVSA-2008-147.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2009/04/23

Modified: 2013/06/01

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64pcre-devel, p-cpe:/a:mandriva:linux:lib64pcre0, p-cpe:/a:mandriva:linux:libpcre-devel, p-cpe:/a:mandriva:linux:libpcre0, p-cpe:/a:mandriva:linux:pcre, cpe:/o:mandriva:linux:2007.1, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2008.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2008/07/15

Reference Information

CVE: CVE-2008-2371

MDVSA: 2008:147

CWE: 119