Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN260-1 : flex vulnerability


Vulnerability Assessment Details

USN260-1 : flex vulnerability

Vulnerability Assessment Summary
flex vulnerability

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- cpp-3.3
- cpp-3.3-doc
- cpp-3.4
- cpp-3.4-doc
- fastjar
- fixincludes
- flex
- flex-doc
- g++-3.3
- g++-3.4
- g77-3.3
- g77-3.3-doc
- g77-3.4
- g77-3.4-doc
- gcc-3.3
- gcc-3.3-base
- gcc-3.3-doc
- gcc-3.4
- gcc-3.4-base
- gcc-3.4-doc
- gcj-3.3
- gcj-3.4
- gij-3.3
- gij-3.4
- gnat-3.3
- gnat-3.3-doc
- gnat-3.4
- gnat-3.4-doc
- gobjc-3.3
- gobjc-3.4
- gpc-2.1-3.3
- gpc-2.1-3.3-doc
- gpc-2.1-3.4
- gpc-2.1-3.4-doc
- lib32g
[...]

Description :

Chris Moore discovered a buffer overflow in a particular class of
lexicographical scanners generated by flex. This could be exploited to
execute arbitrary code by processing specially crafted user-defined
input to an application that uses a flex scanner for parsing.

This flaw particularly affects gpc, the GNU Pascal Compiler. A
potentially remote attacker could exploit this by tricking an user or
automated system into compiling a specially crafted Pascal source code
file.

Please note that gpc is not officially supported in Ubuntu (it is in
the 'universe' component of the archive). However, this affects you if
you use a customized version built from the gcc-3.3 or gcc-3.4 source
package (which is supported).

Solution :

Upgrade to :
- cpp-3.3-3.3.5-8ubuntu2.1 (Ubuntu 5.04)
- cpp-3.3-doc-3.3.5-8ubuntu2.1 (Ubuntu 5.04)
- cpp-3.4-3.4.4-6ubuntu8.1 (Ubuntu 5.10)
- cpp-3.4-doc-3.4.4-6ubuntu8.1 (Ubuntu 5.10)
- fastjar-3.4.2-2ubuntu1.1 (Ubuntu 4.10)
- fixincludes-3.3.4-9ubuntu5.1 (Ubuntu 4.10)
- flex-2.5.31-31ubuntu0.5.10.1 (Ubuntu 5.10)
- flex-doc-2.5.31-31ubuntu0.5.10.1 (Ubuntu 5.10)
- g++-3.3-3.3.5-8ubuntu2.1 (Ubuntu 5.04)
- g++-3.4-3.4.4-6ubuntu8.1 (Ubuntu 5.10)
- g77-3.3-3.3.5-8ubuntu2.1 (Ubuntu 5.04)
- g77-3.3-doc-3.3.5-8u
[...]


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

Mix Lot of 2 Genuine Samsung CLT-P409A Magenta Yellow Toner Cartridges
$39.99
Mix Lot of 2 Genuine Samsung CLT-P409A Magenta Yellow Toner Cartridges picture32GB Micro USB 2.0 Flash Drive U-Disk memory addon smartphone tablet Samsung
$0.95
32GB Micro USB 2.0 Flash Drive U-Disk memory addon smartphone tablet Samsung  pictureSamsung Galaxy Tab 4 SM-T530N 16GB, Wi-Fi, 10.1in - Black (Latest Model)
$162.0
Samsung Galaxy Tab 4 SM-T530N 16GB, Wi-Fi, 10.1in - Black (Latest Model)  pictureSamsung 256MB DDR PC2700S-25331-A0 CL2.5 #M470L3224FT0-CB3 - Laptop Memory
$5.0
Samsung 256MB DDR PC2700S-25331-A0 CL2.5 #M470L3224FT0-CB3 - Laptop Memory picture


Discussions

No Discussions have been posted on this vulnerability.