Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.842393
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu Update for pcre3 USN-2694-1
Zusammenfassung:The remote host is missing an update for the 'pcre3'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'pcre3'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Michele Spagnuolo discovered that PCRE
incorrectly handled certain regular expressions. A remote attacker could use this
issue to cause applications using PCRE to crash, resulting in a denial of service,
or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-8964)

Kai Lu discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04.
(CVE-2015-2325, CVE-2015-2326)

Wen Guanxing discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 15.04. (CVE-2015-3210)

It was discovered that PCRE incorrectly handled certain regular
expressions. A remote attacker could use this issue to cause applications
using PCRE to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 12.04 LTS and 14.04 LTS.
(CVE-2015-5073)

Affected Software/OS:
pcre3 on Ubuntu 14.04 LTS,
Ubuntu 12.04 LTS

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-8964
BugTraq ID: 71206
http://www.securityfocus.com/bid/71206
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145843.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147474.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147516.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147511.html
https://security.gentoo.org/glsa/201607-02
http://www.mandriva.com/security/advisories?name=MDVSA-2015:002
http://www.mandriva.com/security/advisories?name=MDVSA-2015:137
http://www.openwall.com/lists/oss-security/2014/11/21/6
RedHat Security Advisories: RHSA-2015:0330
http://rhn.redhat.com/errata/RHSA-2015-0330.html
SuSE Security Announcement: openSUSE-SU-2015:0858 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-2325
https://bugs.exim.org/show_bug.cgi?id=1591
https://fortiguard.com/zeroday/FG-VD-15-015
Common Vulnerability Exposure (CVE) ID: CVE-2015-2326
https://bugs.exim.org/show_bug.cgi?id=1592
https://fortiguard.com/zeroday/FG-VD-15-016
Common Vulnerability Exposure (CVE) ID: CVE-2015-3210
BugTraq ID: 74934
http://www.securityfocus.com/bid/74934
http://www.openwall.com/lists/oss-security/2015/06/01/7
http://www.openwall.com/lists/oss-security/2015/12/02/11
RedHat Security Advisories: RHSA-2016:1132
https://access.redhat.com/errata/RHSA-2016:1132
RedHat Security Advisories: RHSA-2016:2750
http://rhn.redhat.com/errata/RHSA-2016-2750.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-5073
BugTraq ID: 75430
http://www.securityfocus.com/bid/75430
http://www.openwall.com/lists/oss-security/2015/06/26/1
http://www.openwall.com/lists/oss-security/2015/06/26/3
RedHat Security Advisories: RHSA-2016:1025
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://www.securitytracker.com/id/1033154
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.