Mandriva Linux Security Advisory : icu (MDVSA-2015:161-1)

high Nessus Plugin ID 82414
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.9


The remote Mandriva Linux host is missing one or more security updates.


Updated icu packages fix security vulnerabilities :

The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier or look-behind expression (CVE-2014-7923, CVE-2014-7926).

The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence (CVE-2014-7940).

It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program (CVE-2014-6585, CVE-2014-6591).


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 82414

File Name: mandriva_MDVSA-2015-161.nasl

Version: 1.12

Type: local

Published: 3/30/2015

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: High

VPR Score: 5.9

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:icu, p-cpe:/a:mandriva:linux:icu-data, p-cpe:/a:mandriva:linux:icu-doc, p-cpe:/a:mandriva:linux:lib64icu-devel, p-cpe:/a:mandriva:linux:lib64icu48, p-cpe:/a:mandriva:linux:lib64icu52, cpe:/o:mandriva:business_server:1, cpe:/o:mandriva:business_server:2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/29/2015

Reference Information

CVE: CVE-2014-6585, CVE-2014-6591, CVE-2014-7923, CVE-2014-7926, CVE-2014-7940

BID: 72173, 72175, 72288

MDVSA: 2015:161, 2015:161-1