Computer Security
[EN] securityvulns.ru no-pyccku


PCRE library buffer overflow
updated since 20.02.2008
Published:17.04.2008
Source:
SecurityVulns ID:8706
Type:library
Threat Level:
7/10
Description:Buffer overflows on regular expressins with codepoints greatr than 255.
Affected:PCRE : pcre 4.5
 CHIKEN : chicken 3.1
CVE:CVE-2008-1026
 CVE-2008-0674 (Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.)
 CVE-2006-7228 (Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.)
Original documentdocumentZDI, ZDI-08-022: Apple Safari WebKit PCRE Handling Integer Overflow Vulnerability (17.04.2008)
 documentGENTOO, [ GLSA 200802-10 ] Python: PCRE Integer overflow (26.02.2008)
 documentFlorian Weimer, [SECURITY] [DSA 1499-1] New pcre3 packages fix arbitrary code execution (20.02.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod