----------------------------------------------------------------------

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

----------------------------------------------------------------------

TITLE:
SUSE update for pcre

SECUNIA ADVISORY ID:
SA27773

VERIFY ADVISORY:
http://secunia.com/advisories/27773/

CRITICAL:
Moderately critical

IMPACT:
Exposure of sensitive information, DoS, System access

WHERE:
>From remote

OPERATING SYSTEM:
openSUSE 10.3
http://secunia.com/product/16124/
openSUSE 10.2
http://secunia.com/product/13375/
SUSE Linux 10.1
http://secunia.com/product/10796/
SUSE Linux 10
http://secunia.com/product/6221/
SuSE Linux Enterprise Server 8
http://secunia.com/product/1171/
SuSE Linux Openexchange Server 4.x
http://secunia.com/product/2001/
SuSE Linux Standard Server 8
http://secunia.com/product/2526/
SUSE Linux Enterprise Server 9
http://secunia.com/product/4118/
SuSE Linux Desktop 1.x
http://secunia.com/product/2002/
SUSE Linux Enterprise Server 10
http://secunia.com/product/12192/
UnitedLinux 1.0
http://secunia.com/product/2003/

DESCRIPTION:
SUSE has issued an update for pcre. This fixes some vulnerabilities,
which can be exploited by malicious people to cause a DoS (Denial of
Service), disclose potentially sensitive information, and compromise
a vulnerable system.

For more information:
SA27543
SA27582

SOLUTION:
Apply updated packages.

x86 Platform:

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/pcre-7.2-14.2.i586.rpm
638bc8ea3b3049bf8f018cbe2c636c8c

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/pcre-devel-7.2-14.2.i586.rpm
2aba0cac3367280a938bf7d0e75b811c

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/pcre-6.7-25.i586.rpm
aae587979521d9215fcedeba6ffdd5d3
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/pcre-devel-6.7-25.i586.rpm
67e29afb709d1f1d3270cd259afc3302

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcre-6.4-14.12.i586.rpm
f23b3c0a085307189770ef6446ddf95e

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/pcre-devel-6.4-14.12.i586.rpm
360c141d251b19d20bc87f02c014ca85

SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/pcre-6.2-2.6.i586.rpm
a6d52c75af7b87f5839c93ad765fc471

ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/pcre-devel-6.2-2.6.i586.rpm
3127d163cb29fe4023d9ce7de694992f

Power PC Platform:

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/pcre-6.7-25.ppc.rpm
31efc0735941f2ba8e378c5282715a14
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/pcre-devel-6.7-25.ppc.rpm
10a13246ef2f68b9b59a33e80bb50a7d

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcre-6.4-14.12.ppc.rpm
44ddec7ac85dbf91cb34afb089357d4d
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/pcre-devel-6.4-14.12.ppc.rpm
e8e6d6c2f78904a886114f635bf184a9

SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/pcre-6.2-2.6.ppc.rpm
61f6f3eda12cfa2daab879ab39169d22

ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/pcre-devel-6.2-2.6.ppc.rpm
0e4859e31522fb242ffab6a07aaf77fa

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/pcre-7.2-14.2.ppc.rpm
a54e3a3eddaabc9f89d6019bb12f2081

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/ppc/pcre-devel-7.2-14.2.ppc.rpm
9043d0181ba37fc0c86fae3429f1cda0

x86-64 Platform:

openSUSE 10.2:

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/pcre-32bit-6.7-25.x86_64.rpm
b4a5e803fba79cce1dca2f60fbf5c72c
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/pcre-6.7-25.x86_64.rpm
cb81d1ee51a9ad918168e986f16e028f

ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/pcre-devel-6.7-25.x86_64.rpm
322c88af597a52657e403a7268e752d0

SUSE LINUX 10.1:

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcre-32bit-6.4-14.12.x86_64.rpm
527b30661fa36d99d80cbd6e3051d45a
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcre-6.4-14.12.x86_64.rpm
347cf67ca766245983a736af5529cc0d

ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/pcre-devel-6.4-14.12.x86_64.rpm
c8a3ba1109569e7bc39331c1ada22d43

SUSE LINUX 10.0:

ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/pcre-32bit-6.2-2.6.x86_64.rpm
11bff919ac213631e0b10838de3e2e74

ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/pcre-6.2-2.6.x86_64.rpm
dd475be9f1d852b35907d540d1e1afe9

ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/pcre-devel-6.2-2.6.x86_64.rpm
8a09951c95692f97ae5772594e5f7f44

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/pcre-32bit-7.2-14.2.x86_64.rpm
6132117b7d5c9c22564384d8e16447c4

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/pcre-7.2-14.2.x86_64.rpm
411c7ab54802ff8bf2abc03cea0d0d39

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/pcre-devel-7.2-14.2.x86_64.rpm
7856ed6adf0fc2d38e95777b8f050ee0

Sources:

openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/pcre-6.7-25.src.rpm
f5fbd77e5a2bb3ab5b4e2079eb66c9f8

SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/pcre-6.4-14.12.src.rpm
605123a0c31cb6019d0a71cc8f998bb5

SUSE LINUX 10.0:
ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/pcre-6.2-2.6.src.rpm
edea2557792769392a29bebef2136ea9

openSUSE 10.3:

http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/pcre-7.2-14.2.src.rpm
3ad3dbb6ba1fe69dd2b0bf265191e267

UnitedLinux 1.0

http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html

SuSE Linux Openexchange Server 4

http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html

SuSE Linux Enterprise Server 8

http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html

SuSE Linux Standard Server 8

http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html

SuSE Linux School Server

http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html

SUSE LINUX Retail Solution 8

http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html

SuSE Linux Desktop 1.0

http://support.novell.com/techcenter/psdb/206d9e9430eb6c86c8470f0497fc9219.html

Open Enterprise Server

http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html

Novell Linux POS 9

http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html

Novell Linux Desktop 9

http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html

SUSE SLES 9

http://support.novell.com/techcenter/psdb/9992478cea3704f6f2c2f7741f3e12e2.html

SUSE Linux Enterprise Server 10 SP1

http://support.novell.com/techcenter/psdb/ed2f85edfa5f04634eda2d480d600b13.html

SLE SDK 10 SP1

http://support.novell.com/techcenter/psdb/ed2f85edfa5f04634eda2d480d600b13.html

SUSE Linux Enterprise Desktop 10 SP1

http://support.novell.com/techcenter/psdb/ed2f85edfa5f04634eda2d480d600b13.html

ORIGINAL ADVISORY:
http://lists.opensuse.org/opensuse-security-announce/2007-11/msg00004.html

OTHER REFERENCES:
SA27543:
http://secunia.com/advisories/27543/

SA27582:
http://secunia.com/advisories/27582/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------