Vulnerability Name:

CVE-2005-2491 (CCN-21970)

Assigned:2005-08-01
Published:2005-08-01
Updated:2023-02-13
Summary:Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Consequences:Gain Access
References:Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: SGI Security Advisory 20060401-01-U
SGI Advanced Linux Environment 3 Security Update #56

Source: CCN
Type: Neohapsis BugTraq Message #0217 SSRT051251
Apache-based Web Server on HP-UX mod_ssl, proxy_http, Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access

Source: CCN
Type: Full-Disclosure Mailing List, Sat Sep 03 2005 - 04:15:51 CDT
Gnumeric: Heap overflow in the included PCRE library

Source: CCN
Type: Full-Disclosure Mailing List, Mon Nov 13 2006 - 17:23:03 CST
VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2

Source: MITRE
Type: CNA
CVE-2005-2491

Source: CCN
Type: Conective Linux Security Announcement CLSA-2005:1009
Fix for PCRE vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2005-358
exim security update

Source: CCN
Type: RHSA-2005-761
pcre security update

Source: CCN
Type: RHSA-2006-0197
python security update

Source: CCN
Type: SA16502
PCRE Quantifier Values Integer Overflow Vulnerability

Source: CCN
Type: SA17252
Avaya Intuity LX Two Vulnerabilities

Source: CCN
Type: SA17813
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: CCN
Type: SA19072
Sun Solaris Multiple Apache2 Vulnerabilities

Source: CCN
Type: SA21522
Avaya Products Integer Overflow and Denial of Service

Source: CCN
Type: SA22691
HP System Management Homepage PHP Multiple Vulnerabilities

Source: CCN
Type: SA22875
VMware ESX Server Multiple Vulnerabilities

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: SECTRACK ID: 1014744
PCRE Heap Overflow May Let Users Execute Arbitrary Code

Source: secalert@redhat.com
Type: Patch
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: ASA-2006-023
Apache-based Web Server on HP-UX (HPSBUX02074)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: ASA-2006-159
python security update (RHSA-2006-0197)

Source: CCN
Type: The Apache HTTP Server Project Web site
Apache HTTP Server 2.0.55 Released

Source: CCN
Type: CIAC Information Bulletin P-296
PCRE3

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: DEBIAN
Type: DSA-800
pcre3 -- integer overflow

Source: DEBIAN
Type: DSA-817
python2.2 -- integer overflow

Source: DEBIAN
Type: DSA-819
python2.1 -- integer overflow

Source: DEBIAN
Type: DSA-821
python2.3 -- integer overflow

Source: CCN
Type: Ethereal Security Advisory #enpa-sa-00021
Multiple problems in Ethereal versions 0.8.5 to 0.10.10

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-200508-17
libpcre: Heap integer overflow

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-200509-02
Gnumeric: Heap overflow in the included PCRE library

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-200509-08
Python: Heap overflow in the included PCRE library

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-200509-12
Apache, mod_ssl: Multiple vulnerabilities

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: GLSA-200509-19
PHP: Vulnerabilities in included PCRE and XML-RPC libraries

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: OpenPKG-SA-2005.018
pcre

Source: CCN
Type: PCRE Web site
PCRE - Perl Compatible Regular Expressions

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-14620
PCRE Regular Expression Heap Overflow Vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: BID-15647
RETIRED: Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: TLSA-2005-92
Integer overflow

Source: CCN
Type: USN-173-1
PCRE vulnerability

Source: CCN
Type: USN-173-2
PCRE vulnerability

Source: CCN
Type: USN-173-3
Fixed apache2 packages for USN-173-2

Source: CCN
Type: USN-173-4
PCRE vulnerabilities

Source: CCN
Type: VMware Web site
VMware ESX Server 2.0.2 Upgrade Patch 2 (for 2.0.2 Systems Only)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
pcre-pcrecompile-bo(21970)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: SUSE
Type: SUSE-SA:2005:048
pcre: remote code execution

Source: SUSE
Type: SUSE-SA:2005:049
php4 php5: remote code execution

Source: SUSE
Type: SUSE-SA:2005:051
php4 php5: remote code execution

Source: SUSE
Type: SUSE-SA:2005:052
apache2: local command execution authentication bypass memory consumption

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20052491
    V
    CVE-2005-2491
    2015-11-16
    oval:org.mitre.oval:def:11516
    V
    Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
    2013-04-29
    oval:org.mitre.oval:def:1496
    V
    Webproxy Integer Overflow in pcre_compile
    2007-10-02
    oval:org.mitre.oval:def:1659
    V
    VirusVault Integer Overflow in pcre_compile
    2007-10-02
    oval:com.redhat.rhsa:def:20060197
    P
    RHSA-2006:0197: python security update (Moderate)
    2006-03-09
    oval:org.mitre.oval:def:735
    V
    Apache Integer Overflow in pcre_compile.c
    2006-01-25
    oval:org.debian:def:821
    V
    integer overflow
    2005-09-28
    oval:org.debian:def:819
    V
    integer overflow
    2005-09-23
    oval:org.debian:def:817
    V
    integer overflow
    2005-09-22
    oval:com.redhat.rhsa:def:20050358
    P
    RHSA-2005:358: exim security update (Moderate)
    2005-09-08
    oval:com.redhat.rhsa:def:20050761
    P
    RHSA-2005:761: pcre security update (Moderate)
    2005-09-08
    oval:org.debian:def:800
    V
    integer overflow
    2005-09-02
    BACK