Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.gentoo.org/show_bug.cgi?id=228091 - Exploit, Issue Tracking | |
References | () http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes - Third Party Advisory | |
References | () http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html - Mailing List | |
References | () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=124654546101607&w=2 - Issue Tracking, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=125631037611762&w=2 - Issue Tracking, Third Party Advisory | |
References | () http://secunia.com/advisories/30916 - Not Applicable | |
References | () http://secunia.com/advisories/30944 - Not Applicable | |
References | () http://secunia.com/advisories/30945 - Not Applicable | |
References | () http://secunia.com/advisories/30958 - Not Applicable | |
References | () http://secunia.com/advisories/30961 - Not Applicable | |
References | () http://secunia.com/advisories/30967 - Not Applicable | |
References | () http://secunia.com/advisories/30972 - Not Applicable | |
References | () http://secunia.com/advisories/30990 - Not Applicable | |
References | () http://secunia.com/advisories/31200 - Not Applicable | |
References | () http://secunia.com/advisories/32222 - Not Applicable | |
References | () http://secunia.com/advisories/32454 - Not Applicable | |
References | () http://secunia.com/advisories/32746 - Not Applicable | |
References | () http://secunia.com/advisories/35074 - Not Applicable | |
References | () http://secunia.com/advisories/35650 - Not Applicable | |
References | () http://secunia.com/advisories/39300 - Not Applicable | |
References | () http://security.gentoo.org/glsa/glsa-200811-05.xml - Third Party Advisory | |
References | () http://support.apple.com/kb/HT3216 - Third Party Advisory | |
References | () http://support.apple.com/kb/HT3549 - Third Party Advisory | |
References | () http://ubuntu.com/usn/usn-624-2 - Third Party Advisory | |
References | () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305 - Broken Link, Third Party Advisory | |
References | () http://www.debian.org/security/2008/dsa-1602 - Third Party Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:147 - Broken Link, Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:023 - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/497828/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/30087 - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/31681 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-624-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/usn-628-1 - Third Party Advisory | |
References | () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2008/2005 - Permissions Required, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/2006 - Permissions Required, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/2336 - Permissions Required, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/2780 - Permissions Required, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2009/1297 - Permissions Required, Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0833 - Permissions Required, Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html - Third Party Advisory |
01 Aug 2022, 15:54
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
References | (SECUNIA) http://secunia.com/advisories/32222 - Not Applicable | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/2780 - Permissions Required, Third Party Advisory | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Mailing List | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:147 - Broken Link, Third Party Advisory | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html - Mailing List | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2009:023 - Broken Link, Third Party Advisory | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/497828/100/0/threaded - Third Party Advisory, VDB Entry | |
References | (HP) http://marc.info/?l=bugtraq&m=125631037611762&w=2 - Issue Tracking, Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/2336 - Permissions Required, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/31200 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/30945 - Not Applicable | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA09-133A.html - Third Party Advisory, US Government Resource | |
References | (CONFIRM) http://support.apple.com/kb/HT3549 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/32746 - Not Applicable | |
References | (HP) http://marc.info/?l=bugtraq&m=124654546101607&w=2 - Issue Tracking, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/30961 - Not Applicable | |
References | (CONFIRM) http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305 - Broken Link, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-628-1 - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/0833 - Permissions Required, Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/2006 - Permissions Required, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/39300 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/32454 - Not Applicable | |
References | (CONFIRM) http://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changes - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/30087 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://support.apple.com/kb/HT3216 - Third Party Advisory | |
References | (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/31681 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/35074 - Not Applicable | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200811-05.xml - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2009/1297 - Permissions Required, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/30916 - Not Applicable | |
References | (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=228091 - Exploit, Issue Tracking | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-624-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/35650 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/30972 - Not Applicable | |
References | (UBUNTU) http://ubuntu.com/usn/usn-624-2 - Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2008/dsa-1602 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/30944 - Not Applicable | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/2005 - Permissions Required, Third Party Advisory | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/30990 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/30967 - Not Applicable | |
References | (SECUNIA) http://secunia.com/advisories/30958 - Not Applicable | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:* |
Information
Published : 2008-07-07 23:41
Updated : 2024-11-21 00:46
NVD link : CVE-2008-2371
Mitre link : CVE-2008-2371
CVE.ORG link : CVE-2008-2371
JSON object : View
Products Affected
canonical
- ubuntu_linux
pcre
- pcre
fedoraproject
- fedora
opensuse
- opensuse
debian
- debian_linux
php
- php
CWE
CWE-787
Out-of-bounds Write