Mandriva Linux Security Advisory : icu (MDVSA-2015:161-1)

High Nessus Plugin ID 82414


The remote Mandriva Linux host is missing one or more security updates.


Updated icu packages fix security vulnerabilities :

The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier or look-behind expression (CVE-2014-7923, CVE-2014-7926).

The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence (CVE-2014-7940).

It was discovered that ICU incorrectly handled memory operations when processing fonts. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program (CVE-2014-6585, CVE-2014-6591).


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 82414

File Name: mandriva_MDVSA-2015-161.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2015/03/30

Modified: 2016/03/14

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:icu, p-cpe:/a:mandriva:linux:icu-data, p-cpe:/a:mandriva:linux:icu-doc, p-cpe:/a:mandriva:linux:lib64icu-devel, p-cpe:/a:mandriva:linux:lib64icu48, p-cpe:/a:mandriva:linux:lib64icu52, cpe:/o:mandriva:business_server:1, cpe:/o:mandriva:business_server:2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/03/29

Reference Information

CVE: CVE-2014-6585, CVE-2014-6591, CVE-2014-7923, CVE-2014-7926, CVE-2014-7940

BID: 72173, 72175, 72288

OSVDB: 117232, 117233, 117380, 117383, 117397

MDVSA: 2015:161, 2015:161-1