Vulnerability Name: | CVE-2005-2491 (CCN-21970) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2005-08-01 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2005-08-01 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: SGI Security Advisory 20060401-01-U SGI Advanced Linux Environment 3 Security Update #56 Source: CCN Type: Neohapsis BugTraq Message #0217 SSRT051251 Apache-based Web Server on HP-UX mod_ssl, proxy_http, Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access Source: CCN Type: Full-Disclosure Mailing List, Sat Sep 03 2005 - 04:15:51 CDT Gnumeric: Heap overflow in the included PCRE library Source: CCN Type: Full-Disclosure Mailing List, Mon Nov 13 2006 - 17:23:03 CST VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 Source: MITRE Type: CNA CVE-2005-2491 Source: CCN Type: Conective Linux Security Announcement CLSA-2005:1009 Fix for PCRE vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2005-358 exim security update Source: CCN Type: RHSA-2005-761 pcre security update Source: CCN Type: RHSA-2006-0197 python security update Source: CCN Type: SA16502 PCRE Quantifier Values Integer Overflow Vulnerability Source: CCN Type: SA17252 Avaya Intuity LX Two Vulnerabilities Source: CCN Type: SA17813 Mac OS X Security Update Fixes Multiple Vulnerabilities Source: CCN Type: SA19072 Sun Solaris Multiple Apache2 Vulnerabilities Source: CCN Type: SA21522 Avaya Products Integer Overflow and Denial of Service Source: CCN Type: SA22691 HP System Management Homepage PHP Multiple Vulnerabilities Source: CCN Type: SA22875 VMware ESX Server Multiple Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: SECTRACK ID: 1014744 PCRE Heap Overflow May Let Users Execute Arbitrary Code Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: ASA-2006-023 Apache-based Web Server on HP-UX (HPSBUX02074) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: ASA-2006-159 python security update (RHSA-2006-0197) Source: CCN Type: The Apache HTTP Server Project Web site Apache HTTP Server 2.0.55 Released Source: CCN Type: CIAC Information Bulletin P-296 PCRE3 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: DEBIAN Type: DSA-800 pcre3 -- integer overflow Source: DEBIAN Type: DSA-817 python2.2 -- integer overflow Source: DEBIAN Type: DSA-819 python2.1 -- integer overflow Source: DEBIAN Type: DSA-821 python2.3 -- integer overflow Source: CCN Type: Ethereal Security Advisory #enpa-sa-00021 Multiple problems in Ethereal versions 0.8.5 to 0.10.10 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GLSA-200508-17 libpcre: Heap integer overflow Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GLSA-200509-02 Gnumeric: Heap overflow in the included PCRE library Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GLSA-200509-08 Python: Heap overflow in the included PCRE library Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GLSA-200509-12 Apache, mod_ssl: Multiple vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: GLSA-200509-19 PHP: Vulnerabilities in included PCRE and XML-RPC libraries Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: OpenPKG-SA-2005.018 pcre Source: CCN Type: PCRE Web site PCRE - Perl Compatible Regular Expressions Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-14620 PCRE Regular Expression Heap Overflow Vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-15647 RETIRED: Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: TLSA-2005-92 Integer overflow Source: CCN Type: USN-173-1 PCRE vulnerability Source: CCN Type: USN-173-2 PCRE vulnerability Source: CCN Type: USN-173-3 Fixed apache2 packages for USN-173-2 Source: CCN Type: USN-173-4 PCRE vulnerabilities Source: CCN Type: VMware Web site VMware ESX Server 2.0.2 Upgrade Patch 2 (for 2.0.2 Systems Only) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN pcre-pcrecompile-bo(21970) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: SUSE Type: SUSE-SA:2005:048 pcre: remote code execution Source: SUSE Type: SUSE-SA:2005:049 php4 php5: remote code execution Source: SUSE Type: SUSE-SA:2005:051 php4 php5: remote code execution Source: SUSE Type: SUSE-SA:2005:052 apache2: local command execution authentication bypass memory consumption | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |