CVE-2008-2371
07.07.2008, 23:41
Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.Enginsight
Vendor | Product | Version |
---|---|---|
pcre | pcre | 7.7 |
php | php | 5.2.0 ≤ 𝑥 ≤ 5.2.7 |
debian | debian_linux | 4.0 |
canonical | ubuntu_linux | 6.06 |
canonical | ubuntu_linux | 7.04 |
canonical | ubuntu_linux | 7.10 |
canonical | ubuntu_linux | 8.04 |
canonical | ubuntu_linux | 9.10 |
opensuse | opensuse | 10.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
erlang |
| ||||||||||||||
pcre3 |
| ||||||||||||||
php5 |
|
Common Weakness Enumeration
References