Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-2491

Опубликовано: 23 авг. 2005
Источник: debian

Описание

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcre3fixed6.3-1package
gnumericfixed1.5.1-1package
gofficefixed0.1.0-3package
vfunot-affectedpackage
python2.1fixed2.1.3dfsg-3package
python2.2fixed2.2.3dfsg-4package
python2.3fixed2.3.5-8package

Примечания

  • gnumeric/goffice includes one as well; not exploitable as affected code not used

Связанные уязвимости

ubuntu
около 20 лет назад

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

redhat
около 20 лет назад

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

nvd
около 20 лет назад

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

github
больше 3 лет назад

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.