CVE-2008-2371

EUVD-2008-2366
Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Affected Products (NVD)
VendorProductVersion
pcrepcre
7.7
phpphp
5.2.0 ≤
𝑥
≤ 5.2.7
debiandebian_linux
4.0
canonicalubuntu_linux
6.06
canonicalubuntu_linux
7.04
canonicalubuntu_linux
7.10
canonicalubuntu_linux
8.04
canonicalubuntu_linux
9.10
opensuseopensuse
10.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pcre3
bookworm
2:8.39-15
fixed
bullseye
2:8.39-13
fixed
sid
2:8.39-15.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
erlang
dapper
not-affected
hardy
not-affected
intrepid
Fixed 1:12.b.3-dfsg-1ubuntu1.1
released
jaunty
Fixed 1:12.b.5-dfsg-2ubuntu0.1
released
karmic
Fixed 1:13.b.1-dfsg-2ubuntu1.1
released
pcre3
dapper
Fixed 7.4-0ubuntu0.6.06.3
released
feisty
Fixed 7.4-0ubuntu0.7.04.3
released
gutsy
Fixed 7.4-0ubuntu0.7.10.3
released
hardy
Fixed 7.4-1ubuntu2.1
released
intrepid
Fixed 7.6-2.1ubuntu1
released
jaunty
not-affected
karmic
not-affected
php5
dapper
not-affected
feisty
not-affected
gutsy
Fixed 5.2.3-1ubuntu6.4
released
hardy
Fixed 5.2.4-2ubuntu5.3
released
intrepid
not-affected
jaunty
not-affected
karmic
not-affected
References