Vulnerability Name:

CVE-2006-7230 (CCN-38582)

Assigned:2007-11-15
Published:2007-11-15
Updated:2017-10-11
Summary:Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Denial of Service
References:Source: MISC
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=198976

Source: MITRE
Type: CNA
CVE-2006-7230

Source: SUSE
Type: UNKNOWN
SUSE-SA:2008:004

Source: CCN
Type: RHSA-2007-1059
Important: pcre security update

Source: CCN
Type: RHSA-2007-1068
Important: pcre security update

Source: SECUNIA
Type: UNKNOWN
27741

Source: SECUNIA
Type: UNKNOWN
27773

Source: CCN
Type: SA28041
Avaya Products PCRE Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
28041

Source: SECUNIA
Type: UNKNOWN
28406

Source: CCN
Type: SA28414
R PCRE Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
28414

Source: SECUNIA
Type: UNKNOWN
28658

Source: SECUNIA
Type: UNKNOWN
28714

Source: SECUNIA
Type: UNKNOWN
28720

Source: SECUNIA
Type: UNKNOWN
30106

Source: CCN
Type: SA30155
Chicken PCRE Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
30155

Source: SECUNIA
Type: UNKNOWN
30219

Source: GENTOO
Type: UNKNOWN
GLSA-200711-30

Source: GENTOO
Type: UNKNOWN
GLSA-200801-02

Source: GENTOO
Type: UNKNOWN
GLSA-200801-18

Source: GENTOO
Type: UNKNOWN
GLSA-200801-19

Source: GENTOO
Type: UNKNOWN
GLSA-200805-11

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm

Source: CCN
Type: ASA-2007-505
PCRE security update (RHSA-2007-1068)

Source: DEBIAN
Type: UNKNOWN
DSA-1570

Source: DEBIAN
Type: DSA-1570
kazehakase -- various

Source: CCN
Type: GLSA-200711-30
PCRE: Multiple vulnerabilities

Source: CCN
Type: GLSA-200801-02
R: Multiple vulnerabilities

Source: CCN
Type: GLSA-200801-18
Kazehakase: Multiple vulnerabilities

Source: CCN
Type: GLSA-200801-19
GOffice: Multiple vulnerabilities

Source: CCN
Type: GLSA-200805-11
Chicken: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:030

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:062

Source: CCN
Type: PCRE Web site
PCRE changelog: Version 7.0 19-Dec-06

Source: CONFIRM
Type: UNKNOWN
http://www.pcre.org/changelog.txt

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1059

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1068

Source: BID
Type: UNKNOWN
26550

Source: CCN
Type: BID-26550
PCRE Regular Expression Library UTF-8 Options Multiple Remote Denial of Service Vulnerabilities

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=384801

Source: XF
Type: UNKNOWN
pcre-regex-utf8-dos(38582)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10911

Source: SUSE
Type: SUSE-SA:2007:062
pcre security problems

Source: SUSE
Type: SUSE-SA:2008:004
php5 php4 Security Problems

Vulnerable Configuration:Configuration 1:
  • cpe:/a:pcre:pcre:*:*:*:*:*:*:*:* (Version <= 6.9)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20067230
    V
    CVE-2006-7230
    2015-11-16
    oval:org.mitre.oval:def:18752
    P
    DSA-1570-1 kazehakase - execution of arbitrary code
    2014-06-23
    oval:org.mitre.oval:def:8010
    P
    DSA-1570 kazehakase -- various
    2014-06-23
    oval:org.mitre.oval:def:22565
    P
    ELSA-2007:1059: pcre security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:10911
    V
    Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
    2013-04-29
    oval:org.debian:def:1570
    V
    various
    2008-05-06
    oval:com.redhat.rhsa:def:20071059
    P
    RHSA-2007:1059: pcre security update (Important)
    2008-03-20
    oval:com.redhat.rhsa:def:20071068
    P
    RHSA-2007:1068: pcre security update (Important)
    2007-11-29
    BACK
    pcre pcre *