Vulnerability Name: | CVE-2006-7230 (CCN-38582) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2007-11-15 | ||||||||||||||||||||||||||||||||||||
Published: | 2007-11-15 | ||||||||||||||||||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||||||||||||||||||
Summary: | Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MISC Type: UNKNOWN http://bugs.gentoo.org/show_bug.cgi?id=198976 Source: MITRE Type: CNA CVE-2006-7230 Source: SUSE Type: UNKNOWN SUSE-SA:2008:004 Source: CCN Type: RHSA-2007-1059 Important: pcre security update Source: CCN Type: RHSA-2007-1068 Important: pcre security update Source: SECUNIA Type: UNKNOWN 27741 Source: SECUNIA Type: UNKNOWN 27773 Source: CCN Type: SA28041 Avaya Products PCRE Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 28041 Source: SECUNIA Type: UNKNOWN 28406 Source: CCN Type: SA28414 R PCRE Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 28414 Source: SECUNIA Type: UNKNOWN 28658 Source: SECUNIA Type: UNKNOWN 28714 Source: SECUNIA Type: UNKNOWN 28720 Source: SECUNIA Type: UNKNOWN 30106 Source: CCN Type: SA30155 Chicken PCRE Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 30155 Source: SECUNIA Type: UNKNOWN 30219 Source: GENTOO Type: UNKNOWN GLSA-200711-30 Source: GENTOO Type: UNKNOWN GLSA-200801-02 Source: GENTOO Type: UNKNOWN GLSA-200801-18 Source: GENTOO Type: UNKNOWN GLSA-200801-19 Source: GENTOO Type: UNKNOWN GLSA-200805-11 Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm Source: CCN Type: ASA-2007-505 PCRE security update (RHSA-2007-1068) Source: DEBIAN Type: UNKNOWN DSA-1570 Source: DEBIAN Type: DSA-1570 kazehakase -- various Source: CCN Type: GLSA-200711-30 PCRE: Multiple vulnerabilities Source: CCN Type: GLSA-200801-02 R: Multiple vulnerabilities Source: CCN Type: GLSA-200801-18 Kazehakase: Multiple vulnerabilities Source: CCN Type: GLSA-200801-19 GOffice: Multiple vulnerabilities Source: CCN Type: GLSA-200805-11 Chicken: Multiple vulnerabilities Source: MANDRIVA Type: UNKNOWN MDVSA-2008:030 Source: SUSE Type: UNKNOWN SUSE-SA:2007:062 Source: CCN Type: PCRE Web site PCRE changelog: Version 7.0 19-Dec-06 Source: CONFIRM Type: UNKNOWN http://www.pcre.org/changelog.txt Source: REDHAT Type: UNKNOWN RHSA-2007:1059 Source: REDHAT Type: UNKNOWN RHSA-2007:1068 Source: BID Type: UNKNOWN 26550 Source: CCN Type: BID-26550 PCRE Regular Expression Library UTF-8 Options Multiple Remote Denial of Service Vulnerabilities Source: MISC Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=384801 Source: XF Type: UNKNOWN pcre-regex-utf8-dos(38582) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10911 Source: SUSE Type: SUSE-SA:2007:062 pcre security problems Source: SUSE Type: SUSE-SA:2008:004 php5 php4 Security Problems | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration RedHat 9: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |