6.8
CVSSv2

CVE-2007-1660

Published: 07/11/2007 Updated: 16/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Perl-Compatible Regular Expression (PCRE) library prior to 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code.

Vulnerable Product Search on Vulmon Subscribe to Product

pcre pcre

Vendor Advisories

Tavis Ormandy and Will Drewry discovered multiple flaws in the regular expression handling of PCRE By tricking a user or service into running specially crafted expressions via applications linked against libpcre3, a remote attacker could crash the application, monopolize CPU resources, or possibly execute arbitrary code with the application’s p ...
Andrews Salomon reported that kazehakase, a GTK+-based web browser that allows pluggable rendering engines, contained an embedded copy of the PCRE library in its source tree which was compiled in and used in preference to the system-wide version of this library The PCRE library has been updated to fix the security issues reported against it in pre ...
Tavis Ormandy of the Google Security Team has discovered several security issues in PCRE, the Perl-Compatible Regular Expression library, which potentially allow attackers to execute arbitrary code by compiling specially crafted regular expressions Version 70 of the PCRE library featured a major rewrite of the regular expression compiler, and i ...

References

CWE-119http://www.debian.org/security/2007/dsa-1399http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.htmlhttps://issues.rpath.com/browse/RPL-1738http://support.avaya.com/elmodocs2/security/ASA-2007-488.htmhttp://security.gentoo.org/glsa/glsa-200711-30.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:211http://www.mandriva.com/security/advisories?name=MDKSA-2007:212http://www.mandriva.com/security/advisories?name=MDKSA-2007:213http://www.redhat.com/support/errata/RHSA-2007-0967.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0968.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1063.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1065.htmlhttp://www.novell.com/linux/security/advisories/2007_62_pcre.htmlhttp://www.novell.com/linux/security/advisories/2007_25_sr.htmlhttp://www.securityfocus.com/bid/26346http://securitytracker.com/id?1018895http://secunia.com/advisories/27598http://secunia.com/advisories/27538http://secunia.com/advisories/27543http://secunia.com/advisories/27547http://secunia.com/advisories/27554http://secunia.com/advisories/27741http://secunia.com/advisories/27773http://secunia.com/advisories/27697http://secunia.com/advisories/27862http://secunia.com/advisories/27776http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlhttp://www.us-cert.gov/cas/techalerts/TA07-352A.htmlhttp://secunia.com/advisories/27965http://secunia.com/advisories/28136http://bugs.gentoo.org/show_bug.cgi?id=198976http://security.gentoo.org/glsa/glsa-200801-02.xmlhttp://secunia.com/advisories/28406http://secunia.com/advisories/28414http://security.gentoo.org/glsa/glsa-200801-18.xmlhttp://security.gentoo.org/glsa/glsa-200801-19.xmlhttp://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.htmlhttp://secunia.com/advisories/28658http://secunia.com/advisories/28714http://secunia.com/advisories/28720http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://secunia.com/advisories/29420http://lists.vmware.com/pipermail/security-announce/2008/000014.htmlhttp://secunia.com/advisories/29785http://security.gentoo.org/glsa/glsa-200805-11.xmlhttp://secunia.com/advisories/30155http://secunia.com/advisories/30219http://www.redhat.com/support/errata/RHSA-2008-0546.htmlhttp://secunia.com/advisories/31124https://bugzilla.redhat.com/show_bug.cgi?id=315881http://secunia.com/advisories/30106http://www.debian.org/security/2008/dsa-1570http://www.vupen.com/english/advisories/2007/4238http://www.vupen.com/english/advisories/2008/0924/referenceshttp://www.vupen.com/english/advisories/2008/1234/referenceshttp://www.vupen.com/english/advisories/2007/3725http://www.vupen.com/english/advisories/2007/3790http://docs.info.apple.com/article.html?artnum=307562http://docs.info.apple.com/article.html?artnum=307179https://exchange.xforce.ibmcloud.com/vulnerabilities/38273https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10562https://usn.ubuntu.com/547-1/http://www.securityfocus.com/archive/1/490917/100/0/threadedhttp://www.securityfocus.com/archive/1/483579/100/0/threadedhttp://www.securityfocus.com/archive/1/483357/100/0/threadedhttps://usn.ubuntu.com/547-1/https://nvd.nist.gov