Debian Security Advisory DSA 1499-1 (pcre3)

Summary
The remote host is missing an update to pcre3 announced via advisory DSA 1499-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201499-1
Insight
It was discovered that specially crafted regular expressions involving codepoints greater than 255 could cause a buffer overflow in the PCRE library (CVE-2008-0674). For the stable distribution (etch), this problem has been fixed in version 6.7+7.4-3. For the old stable distribution (sarge), this problem has been fixed in version 4.5+7.4-2. For the unstable distribution, thi problem has been fixed in version 7.6-1. We recommend that you upgrade your pcre3 package.