Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2005:153: gnumeric Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the gnumeric package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2005:153 (gnumeric).
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions
(PCRE) before 6.2, as used in multiple products, allows attackers to execute
arbitrary code via quantifier values in regular expressions, which leads to a
heap-based buffer overflow.
The gnumeric packages use a private copy of pcre code.
The updated packages have been patched to correct this problem.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:153
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.