Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0090

Опубликовано: 25 янв. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0090: Important: icu security update (IMPORTANT)

[3.6-5.11.1]

  • Resolves: rhbz#429706 CVE-2007-4770 CVE-2007-4771

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

icu

3.6-5.11.1

libicu

3.6-5.11.1

libicu-devel

3.6-5.11.1

libicu-doc

3.6-5.11.1

Oracle Linux i386

icu

3.6-5.11.1

libicu

3.6-5.11.1

libicu-devel

3.6-5.11.1

libicu-doc

3.6-5.11.1

Связанные CVE

Связанные уязвимости

CVSS3: 7.5
fstec
больше 17 лет назад

Уязвимость библиотеки для работы с unicode International Components for Unicode, связанная с ошибкой механизма управления ресурсами системы, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ubuntu
больше 17 лет назад

Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.

redhat
больше 17 лет назад

Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.

nvd
больше 17 лет назад

Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.

debian
больше 17 лет назад

Heap-based buffer overflow in the doInterval function in regexcmp.cpp ...