Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.71121
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2012:0305
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2012:0305.

The boost packages provide free, peer-reviewed, portable C++ source
libraries with emphasis on libraries which work well with the C++ Standard
Library.

Invalid pointer dereference flaws were found in the way the Boost regular
expression library processed certain, invalid expressions. An attacker able
to make an application using the Boost library process a specially-crafted
regular expression could cause that application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. (CVE-2008-0171)

NULL pointer dereference flaws were found in the way the Boost regular
expression library processed certain, invalid expressions. An attacker able
to make an application using the Boost library process a specially-crafted
regular expression could cause that application to crash. (CVE-2008-0172)

Red Hat would like to thank Will Drewry for reporting these issues.

This update also fixes the following bugs:

* Prior to this update, the construction of a regular expression object
could fail when several regular expression objects were created
simultaneously, such as in a multi-threaded program. With this update, the
object variables have been moved from the shared memory to the stack. Now,
the constructing function is thread safe. (BZ#472384)

* Prior to this update, header files in several Boost libraries contained
preprocessor directives that the GNU Compiler Collection (GCC) 4.4 could
not handle. This update instead uses equivalent constructs that are
standard C. (BZ#567722)

All users of boost are advised to upgrade to these updated packages, which
fix these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2012-0305.html

Risk factor : Low

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-0171
BugTraq ID: 27325
http://www.securityfocus.com/bid/27325
Bugtraq: 20080213 rPSA-2008-0063-1 boost (Google Search)
http://www.securityfocus.com/archive/1/488102/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html
http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032
http://secunia.com/advisories/28511
http://secunia.com/advisories/28527
http://secunia.com/advisories/28545
http://secunia.com/advisories/28705
http://secunia.com/advisories/28860
http://secunia.com/advisories/28943
http://secunia.com/advisories/29323
http://secunia.com/advisories/48099
SuSE Security Announcement: SUSE-SR:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
http://www.ubuntu.com/usn/usn-570-1
http://www.vupen.com/english/advisories/2008/0249
Common Vulnerability Exposure (CVE) ID: CVE-2008-0172
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.