Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
References
Configurations
History
No history.
Information
Published : 2007-11-15 19:46
Updated : 2024-02-04 17:13
NVD link : CVE-2006-7230
Mitre link : CVE-2006-7230
CVE.ORG link : CVE-2006-7230
JSON object : View
Products Affected
pcre
- pcre
CWE
CWE-189
Numeric Errors