Описание
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 7.4-0ubuntu0.6.06.1 |
devel | not-affected | |
edgy | released | 7.4-0ubuntu0.6.10.1 |
feisty | released | 7.4-0ubuntu0.7.04.1 |
gutsy | released | 7.4-0ubuntu0.7.10.1 |
upstream | released | 7.3 |
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE ...
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
6.8 Medium
CVSS2