Описание
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | released  | 7.4-0ubuntu0.6.06.1 | 
| devel | not-affected  | |
| edgy | released  | 7.4-0ubuntu0.6.10.1 | 
| feisty | released  | 7.4-0ubuntu0.7.04.1 | 
| gutsy | released  | 7.4-0ubuntu0.7.10.1 | 
| upstream | released  | 7.3 | 
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not ...
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
ELSA-2007-0967: Critical: pcre security update (CRITICAL)
6.8 Medium
CVSS2