Mandriva Linux Security Advisory : pcre (MDVSA-2008:147)

high Nessus Plugin ID 36245


The remote Mandriva Linux host is missing one or more security updates.


Tavis Ormandy of the Google Security Team discovered a heap-based buffer overflow when compiling certain regular expression patterns.
This could be used by a malicious attacker by sending a specially crafted regular expression to an application using the PCRE library, resulting in the possible execution of arbitrary code or a denial of service (CVE-2008-2371).

The updated packages have been patched to correct this issue.


Update the affected packages.

Plugin Details

Severity: High

ID: 36245

File Name: mandriva_MDVSA-2008-147.nasl

Version: 1.13

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 6.6


Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64pcre-devel, p-cpe:/a:mandriva:linux:lib64pcre0, p-cpe:/a:mandriva:linux:libpcre-devel, p-cpe:/a:mandriva:linux:libpcre0, p-cpe:/a:mandriva:linux:pcre, cpe:/o:mandriva:linux:2007.1, cpe:/o:mandriva:linux:2008.0, cpe:/o:mandriva:linux:2008.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 7/15/2008

Reference Information

CVE: CVE-2008-2371

MDVSA: 2008:147

CWE: 119