7.5
CVSSv2

CVE-2008-2371

Published: 07/07/2008 Updated: 01/08/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pcre pcre 7.7

php php

debian debian linux 4.0

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 9.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

fedoraproject fedora 9

fedoraproject fedora 8

opensuse opensuse 10.3

Vendor Advisories

Debian Bug report logs - #488919 CVE-2008-2371: heap-based buffer overflow in PCRE Package: pcre3; Maintainer for pcre3 is Matthew Vernon <matthew@debianorg>; Reported by: Sebastian Dröge <slomo@circular-chaosorg> Date: Wed, 2 Jul 2008 04:45:02 UTC Severity: grave Tags: patch Found in version 76-2 Fixed in vers ...
Tavis Ormandy discovered that the PCRE library did not correctly handle certain in-pattern options An attacker could cause applications linked against pcre3 to crash, leading to a denial of service ...
USN-624-1 fixed a vulnerability in PCRE This update provides the corresponding update for Erlang ...
It was discovered that PHP did not properly check the length of the string parameter to the fnmatch function An attacker could cause a denial of service in the PHP interpreter if a script passed untrusted input to the fnmatch function (CVE-2007-4782) ...
Tavis Ormandy discovered that PCRE, the Perl-Compatible Regular Expression library, may encounter a heap overflow condition when compiling certain regular expressions involving in-pattern options and branches, potentially leading to arbitrary code execution For the stable distribution (etch), this problem has been fixed in version 67+74-4 For ...

References

CWE-787http://bugs.gentoo.org/show_bug.cgi?id=228091http://www.debian.org/security/2008/dsa-1602http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.htmlhttp://secunia.com/advisories/30916http://secunia.com/advisories/30944http://secunia.com/advisories/30958http://secunia.com/advisories/30961http://www.ubuntu.com/usn/usn-624-1http://secunia.com/advisories/30967http://www.mandriva.com/security/advisories?name=MDVSA-2008:147https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.htmlhttp://www.gentoo.org/security/en/glsa/glsa-200807-03.xmlhttp://ftp.gnome.org/pub/GNOME/sources/glib/2.16/glib-2.16.4.changeshttp://secunia.com/advisories/31200http://www.ubuntu.com/usn/usn-628-1http://secunia.com/advisories/30972http://www.securityfocus.com/bid/30087http://secunia.com/advisories/30990https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.htmlhttp://secunia.com/advisories/30945http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlhttp://www.securityfocus.com/bid/31681http://secunia.com/advisories/32222http://support.apple.com/kb/HT3216http://secunia.com/advisories/32454http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0305http://www.mandriva.com/security/advisories?name=MDVSA-2009:023http://www.vupen.com/english/advisories/2008/2336http://support.apple.com/kb/HT3549http://www.vupen.com/english/advisories/2009/1297http://www.us-cert.gov/cas/techalerts/TA09-133A.htmlhttp://lists.apple.com/archives/security-announce/2009/May/msg00002.htmlhttp://secunia.com/advisories/35074http://secunia.com/advisories/35650http://marc.info/?l=bugtraq&m=124654546101607&w=2http://marc.info/?l=bugtraq&m=125631037611762&w=2http://ubuntu.com/usn/usn-624-2http://www.vupen.com/english/advisories/2010/0833http://secunia.com/advisories/39300http://www.vupen.com/english/advisories/2008/2005http://www.vupen.com/english/advisories/2008/2006http://www.vupen.com/english/advisories/2008/2780http://secunia.com/advisories/32746http://security.gentoo.org/glsa/glsa-200811-05.xmlhttp://www.securityfocus.com/archive/1/497828/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=488919https://nvd.nist.govhttps://usn.ubuntu.com/624-1/