CVE-2008-2371

Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
pcrepcre
7.7
phpphp
5.2.0 ≤
𝑥
≤ 5.2.7
debiandebian_linux
4.0
canonicalubuntu_linux
6.06
canonicalubuntu_linux
7.04
canonicalubuntu_linux
7.10
canonicalubuntu_linux
8.04
canonicalubuntu_linux
9.10
opensuseopensuse
10.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pcre3
bullseye
2:8.39-13
fixed
bookworm
2:8.39-15
fixed
sid
2:8.39-15.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
erlang
karmic
Fixed 1:13.b.1-dfsg-2ubuntu1.1
released
jaunty
Fixed 1:12.b.5-dfsg-2ubuntu0.1
released
intrepid
Fixed 1:12.b.3-dfsg-1ubuntu1.1
released
hardy
not-affected
dapper
not-affected
pcre3
karmic
not-affected
jaunty
not-affected
intrepid
Fixed 7.6-2.1ubuntu1
released
hardy
Fixed 7.4-1ubuntu2.1
released
gutsy
Fixed 7.4-0ubuntu0.7.10.3
released
feisty
Fixed 7.4-0ubuntu0.7.04.3
released
dapper
Fixed 7.4-0ubuntu0.6.06.3
released
php5
karmic
not-affected
jaunty
not-affected
intrepid
not-affected
hardy
Fixed 5.2.4-2ubuntu5.3
released
gutsy
Fixed 5.2.3-1ubuntu6.4
released
feisty
not-affected
dapper
not-affected
References