Vulnerability Name:

CVE-2008-0674 (CCN-40505)

Assigned:2008-01-28
Published:2008-01-28
Updated:2018-10-15
Summary:Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-0674

Source: CCN
Type: GNOME FTP site
Overview of Changes from GLib 2.14.5 to GLib 2.14.6

Source: CONFIRM
Type: UNKNOWN
http://ftp.gnome.org/pub/gnome/sources/glib/2.14/glib-2.14.6.news

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-07-31

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-10-09

Source: APPLE
Type: UNKNOWN
APPLE-SA-2009-08-05-1

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:004

Source: CCN
Type: PCRE Web site
ChangeLog for PCRE - Version 7.6 28-Jan-08

Source: CONFIRM
Type: UNKNOWN
http://pcre.org/changelog.txt

Source: CCN
Type: SA28923
PCRE Character Class Buffer Overflow

Source: SECUNIA
Type: UNKNOWN
28923

Source: SECUNIA
Type: UNKNOWN
28957

Source: SECUNIA
Type: UNKNOWN
28960

Source: CCN
Type: SA28985
GNOME GLib PCRE Character Class Buffer Overflow

Source: SECUNIA
Type: UNKNOWN
28985

Source: SECUNIA
Type: UNKNOWN
28996

Source: SECUNIA
Type: UNKNOWN
29027

Source: SECUNIA
Type: UNKNOWN
29048

Source: SECUNIA
Type: UNKNOWN
29175

Source: SECUNIA
Type: UNKNOWN
29267

Source: SECUNIA
Type: UNKNOWN
29282

Source: CCN
Type: SA30048
PHP Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
30048

Source: SECUNIA
Type: UNKNOWN
30345

Source: CCN
Type: SA31326
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
31326

Source: CCN
Type: SA32222
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
32222

Source: SECUNIA
Type: UNKNOWN
32746

Source: CCN
Type: SA36096
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
36096

Source: GENTOO
Type: UNKNOWN
GLSA-200803-24

Source: GENTOO
Type: UNKNOWN
GLSA-200811-05

Source: CCN
Type: SECTRACK ID: 1022674
Mac OS X Multiple Image and File Processing Bugs Permit Remote Code Execution

Source: CCN
Type: Apple Web site
About Security Update 2008-005

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3216

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3757

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/Advisories:rPSA-2008-0086

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0086

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176

Source: DEBIAN
Type: UNKNOWN
DSA-1499

Source: DEBIAN
Type: DSA-1499
pcre3 -- buffer overflow

Source: CCN
Type: GLSA-200811-05
PHP: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:053

Source: MLIST
Type: UNKNOWN
[oss-security] 20080502 CVE Request (PHP)

Source: CCN
Type: OSVDB ID: 41989
Perl-Compatible Regular Expression (PCRE) Character Class Handling Remote Overflow

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php

Source: BUGTRAQ
Type: UNKNOWN
20080228 rPSA-2008-0086-1 pcre

Source: BUGTRAQ
Type: UNKNOWN
20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl

Source: BID
Type: UNKNOWN
27786

Source: CCN
Type: BID-27786
PCRE Character Class Buffer Overflow Vulnerability

Source: BID
Type: UNKNOWN
29009

Source: CCN
Type: BID-29009
PHP 5.2.5 and Prior Versions Multiple Vulnerabilities

Source: BID
Type: UNKNOWN
31681

Source: CCN
Type: BID-31681
RETIRED: Apple Mac OS X 2008-007 Multiple Security Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1022674

Source: CCN
Type: USN-581-1
PCRE vulnerability

Source: CERT
Type: US Government Resource
TA09-218A

Source: VUPEN
Type: UNKNOWN
ADV-2008-0570

Source: VUPEN
Type: UNKNOWN
ADV-2008-0592

Source: VUPEN
Type: UNKNOWN
ADV-2008-1412

Source: VUPEN
Type: UNKNOWN
ADV-2008-2268

Source: VUPEN
Type: UNKNOWN
ADV-2008-2780

Source: VUPEN
Type: UNKNOWN
ADV-2009-2172

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=431660

Source: XF
Type: UNKNOWN
pcre-characterclass-bo(40505)

Source: XF
Type: UNKNOWN
pcre-characterclass-bo(40505)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-2223

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-2503

Source: UBUNTU
Type: UNKNOWN
USN-581-1

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-1533

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-1783

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-1842

Source: SUSE
Type: SUSE-SR:2008:004
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:pcre:pcre:*:*:*:*:*:*:*:* (Version <= 7.5)

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20080674
    V
    CVE-2008-0674
    2022-09-02
    oval:org.mitre.oval:def:16801
    P
    USN-581-1 -- pcre3 vulnerability
    2014-06-30
    oval:org.mitre.oval:def:7886
    P
    DSA-1499 pcre3 -- buffer overflow
    2014-06-23
    oval:org.mitre.oval:def:18757
    P
    DSA-1499-1 pcre3 - arbitrary code execution
    2014-06-23
    oval:org.debian:def:1499
    V
    buffer overflow
    2008-02-19
    BACK
    pcre pcre *
    apple mac os x 10.5.6
    gentoo linux *
    apple mac os x 10.4
    apple mac os x 10.4.1
    apple mac os x server 10.4.1
    apple mac os x server 10.4
    debian debian linux 3.1
    apple mac os x server 10.4.2
    apple mac os x 10.4.2
    apple mac os x 10.4.4
    apple mac os x 10.4.3
    apple mac os x server 10.4.3
    apple mac os x server 10.4.4
    apple mac os x 10.4.5
    apple mac os x server 10.4.5
    apple mac os x 10.4.6
    apple mac os x server 10.4.6
    canonical ubuntu 6.06
    apple mac os x 10.4.7
    apple mac os x server 10.4.7
    apple mac os x server 10.4.8
    apple mac os x 10.4.8
    apple mac os x server 10.4.9
    apple mac os x 10.4.9
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    apple mac os x 10.4.10
    apple mac os x server 10.4.10
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    apple mac os x server 10.5
    apple mac os x 10.4.11
    apple mac os x 10.5.1
    apple mac os x server 10.4.11
    apple mac os x server 10.5.1
    apple mac os x 10.5.2
    apple mac os x server 10.5.2
    apple mac os x server 10.5.3
    apple mac os x 10.5.3
    apple mac os x 10.5.4
    apple mac os x server 10.5.4
    apple mac os x 10.5.5
    apple mac os x server 10.5.5
    apple mac os x server 10.5.6
    apple mac os x 10.5.0
    apple mac os x 10.5.7
    apple mac os x server 10.5.7