Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-1026

Опубликовано: 17 апр. 2008
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

1.0.1-4
feisty

DNE

gutsy

ignored

end of life, was needed
hardy

ignored

end of life
intrepid

not-affected

1.0.1-2
jaunty

not-affected

1.0.1-4
karmic

not-affected

1.0.1-4
lucid

not-affected

1.0.1-4
maverick

not-affected

1.0.1-4

Показывать по

EPSS

Процентиль: 90%
0.05274
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.

nvd
больше 17 лет назад

Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.

debian
больше 17 лет назад

Integer overflow in the PCRE regular expression compiler (JavaScriptCo ...

github
больше 3 лет назад

Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 90%
0.05274
Низкий

6.8 Medium

CVSS2