Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-7230

Опубликовано: 15 нояб. 2007
Источник: debian
EPSS Низкий

Описание

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcre3fixed7.0-1package
kazehakasefixed0.5.2-1package
pcre3fixed4.5+7.4-1sargepackage
pcre3fixed6.7+7.4-2etchpackage

EPSS

Процентиль: 85%
0.02478
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

redhat
больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

nvd
больше 17 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

github
около 3 лет назад

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

oracle-oval
больше 17 лет назад

ELSA-2007-1059: Important: pcre security update (IMPORTANT)

EPSS

Процентиль: 85%
0.02478
Низкий