CVE-2008-2371
07.07.2008, 23:41
Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.Enginsight
| Vendor | Product | Version |
|---|---|---|
| pcre | pcre | 7.7 |
| php | php | 5.2.0 ≤ 𝑥 ≤ 5.2.7 |
| debian | debian_linux | 4.0 |
| canonical | ubuntu_linux | 6.06 |
| canonical | ubuntu_linux | 7.04 |
| canonical | ubuntu_linux | 7.10 |
| canonical | ubuntu_linux | 8.04 |
| canonical | ubuntu_linux | 9.10 |
| opensuse | opensuse | 10.3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| erlang |
| ||||||||||||||
| pcre3 |
| ||||||||||||||
| php5 |
|
Common Weakness Enumeration
References