|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-761: pcre Vulnerability Assessment Details
|
RHSA-2005-761: pcre |
||
Check for the version of the pcre packages Detailed Explanation for this Vulnerability Assessment Updated pcre packages are now available to correct a security issue. This update has been rated as having moderate security impact by the Red Hat Security Response Team PCRE is a Perl-compatible regular expression library. An integer overflow flaw was found in PCRE, triggered by a maliciously crafted regular expression. On systems that accept arbitrary regular expressions from untrusted users, this could be exploited to execute arbitrary code with the rights of the application using the library. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2491 to this issue. The security impact of this issue varies depending on the way that applications make use of PCRE. For example, the Apache web server uses the system PCRE library in order to parse regular expressions, but this flaw would only permit a user who already has the ability to write .htaccess files to gain 'apache' rights. For applications supplied with Red Hat Enterprise Linux, a maximum security impact of moderate has been assigned. Users should update to these erratum packages that contain a backported patch to correct this issue. Solution : http://rhn.redhat.com/errata/RHSA-2005-761.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
$599.99
ThinkStation P910 Tower Workstation 30B9 Xeon E5-2650V4 2.2 GHz 48GB PC4 No HDD
$1195.00
Dell Precision 7520 Xeon E3-1505M V6 32GB Ram 256GB SSD, 1TB SSD Win10 Pro
$595.00
Intel Xeon Gold 6126 2.6 GHz LGA 3647 Server CPU Processor SR3B3
$17.99
Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7
$17.99
Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU
$44.99
Intel Xeon Gold 6138 2.0GHz 27.5MB 20-Core 125W LGA3647 SR3B5
$46.00
INTEL XEON GOLD 6148 PROCESSOR | 2.40GHZ | SR3B6
$99.99
HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA
$234.98
|
||
No Discussions have been posted on this vulnerability. |