Vulnerability Name:

CVE-2008-1026 (CCN-41859)

Assigned:2008-04-16
Published:2008-04-16
Updated:2018-10-11
Summary:Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-1026

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-07-11

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-04-16

Source: CCN
Type: APPLE-SA-2008-04-16
APPLE-SA-2008-04-16 Safari 3.1.1

Source: CCN
Type: SA29846
Safari Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
29846

Source: CCN
Type: SA31074
Apple iPhone / iPod touch Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
31074

Source: SREASON
Type: UNKNOWN
3815

Source: CCN
Type: SECTRACK ID: 1019870
Safari WebKit Bug in Processing JavaScript Regular Expressions Lets Remote Users Execute Arbitrary Code

Source: CONFIRM
Type: Patch
http://support.apple.com/kb/HT1467

Source: CCN
Type: Apple Web site
About the security content of iPhone v2.0 and iPod touch v2.0

Source: CCN
Type: OSVDB ID: 43980
Apple Safari WebKit (JavaScriptCore/pcre/pcre_compile.cpp) PCRE Nested Repetition Count Overflow

Source: BUGTRAQ
Type: UNKNOWN
20080416 ZDI-08-022: Apple Safari WebKit PCRE Handling Integer Overflow Vulnerability

Source: BID
Type: UNKNOWN
28815

Source: CCN
Type: BID-28815
Apple Safari WebKit JavaScript Regular Expression Repetition Counts Buffer Overflow Vulnerability

Source: CCN
Type: BID-30186
Apple iPhone and iPod Touch Prior to Version 2.0 Multiple Remote Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1019870

Source: VUPEN
Type: UNKNOWN
ADV-2008-1250

Source: VUPEN
Type: UNKNOWN
ADV-2008-2094

Source: MISC
Type: Patch
http://www.zerodayinitiative.com/advisories/ZDI-08-022

Source: XF
Type: UNKNOWN
apple-safari-webkit-pcrecompile-bo(41859)

Source: XF
Type: UNKNOWN
apple-safari-webkit-pcrecompile-bo(41859)

Source: CCN
Type: ZDI-08-022
Apple Safari WebKit PCRE Handling Integer Overflow Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:apple:safari:3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apple:safari:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.4_beta:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3.0.1:beta:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:beta2:*:*:*:*:*:*:*
  • OR cpe:/a:apple:safari:3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:apple:iphone_os:1.0:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/h:apple:ipod_touch:1.1:*:*:*:*:*:*:*
  • OR cpe:/h:apple:ipod_touch:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/h:apple:ipod_touch:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/h:apple:ipod_touch:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/h:apple:ipod_touch:1.1.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple mac os x 10.4.11
    apple mac os x 10.5.2
    apple mac os x server 10.4.11
    apple mac os x server 10.5.2
    microsoft windows vista *
    microsoft windows xp *
    apple safari 3
    apple safari 3.1
    apple safari 1.2.3
    apple safari 2.0.2
    apple safari 2.0.4
    apple safari 3.0.3
    apple safari 3.0.4_beta
    apple safari 3.1
    apple safari 3.0.1 beta
    apple safari 2.0.3
    apple safari 2.0.1
    apple safari 1.3.1
    apple safari 1.3
    apple safari 1.2.2
    apple safari 1.2.1
    apple safari 1.2
    apple safari 1.1
    apple safari 1.0
    apple safari beta2
    apple safari 3
    apple iphone 1.0
    apple iphone 1.1.2
    apple iphone 1.1.3
    apple iphone 1.1.1
    apple ipod touch 1.1
    apple ipod touch 1.1.1
    apple ipod touch 1.1.2
    apple iphone 1.1.4
    apple ipod touch 1.1.3
    apple ipod touch 1.1.4