Computer Security
[EN] securityvulns.ru no-pyccku


PCRE library buffer overflow
Published:07.07.2008
Source:
SecurityVulns ID:9133
Type:library
Threat Level:
7/10
Description:Buffer overflow on regular expression compiling.
CVE:CVE-2008-2371 (Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1602-1] New pcre3 packages fix arbitrary code execution (07.07.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod