Computer Security
[EN] no-pyccku

PCRE buffer overflow
updated since 18.07.2008
SecurityVulns ID:9152
Threat Level:
Description:Buffer overflow on regular expression compilation.
CVE:CVE-2008-2371 (Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.)
Original documentdocumentMANDRIVA, [ MDVSA-2008:147 ] - Updated pcre packages fix vulnerability (18.07.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod