Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56423
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-260-1 (flex)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to flex
announced via advisory USN-260-1.

===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

flex
gpc-2.1-3.3
gpc-2.1-3.4

The problem can be corrected by upgrading the affected package to
the following versions:

Ubuntu 4.10:

flex: 2.5.31-26ubuntu1.2
gpc-2.1-3.3: 2:3.3.4.20040516-9ubuntu5.1
gpc-2.1-3.4: 3.4.2-2ubuntu1.1

Ubuntu 5.04:

flex: 2.5.31-31ubuntu0.5.04.1
gpc-2.1-3.3: 2:3.3.5.20040516-8ubuntu2.1
gpc-2.1-3.4: 3.4.3-9ubuntu4.1

Ubuntu 5.10:

flex: 2.5.31-31ubuntu0.5.10.1
gpc-2.1-3.4: 3.4.4-6ubuntu8.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Chris Moore discovered a buffer overflow in a particular class of
lexicographical scanners generated by flex. This could be exploited to
execute arbitrary code by processing specially crafted user-defined
input to an application that uses a flex scanner for parsing.

This flaw particularly affects gpc, the GNU Pascal Compiler. A
potentially remote attacker could exploit this by tricking an user or
automated system into compiling a specially crafted Pascal source code
file.

Please note that gpc is not officially supported in Ubuntu (it is in
the 'universe' component of the archive). However, this affects you if
you use a customized version built from the gcc-3.3 or gcc-3.4 source
package (which is supported).





Solution:
https://secure1.securityspace.com/smysecure/catid.html?in=USN-260-1

Risk factor : High

CVSS Score:
7.5

Cross-Ref: BugTraq ID: 16896
Common Vulnerability Exposure (CVE) ID: CVE-2006-0459
16896
http://www.securityfocus.com/bid/16896
19071
http://secunia.com/advisories/19071
19126
http://secunia.com/advisories/19126
19228
http://secunia.com/advisories/19228
19424
http://secunia.com/advisories/19424
23440
http://www.osvdb.org/23440
570
http://securityreason.com/securityalert/570
ADV-2006-0770
http://www.vupen.com/english/advisories/2006/0770
DSA-1020
http://www.us.debian.org/security/2006/dsa-1020
GLSA-200603-07
http://www.gentoo.org/security/en/glsa/glsa-200603-07.xml
USN-260-1
https://usn.ubuntu.com/260-1/
[flex-announce] 20060222 flex 2.5.33 released
http://sourceforge.net/mailarchive/forum.php?thread_name=20060223020346.GA11231%40tabitha.home.tldz.org&forum_name=flex-announce
flex-bypass-security(24995)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24995
http://prdownloads.sourceforge.net/flex/flex-2.5.33.tar.bz2?download
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.