Computer Security
[EN] no-pyccku

PCRE library buffer overflow
SecurityVulns ID:9133
Threat Level:
Description:Buffer overflow on regular expression compiling.
CVE:CVE-2008-2371 (Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1602-1] New pcre3 packages fix arbitrary code execution (07.07.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod