// For flags

CVE-2005-2491

pcre heap overflow

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-08-08 CVE Reserved
  • 2005-08-22 CVE Published
  • 2024-07-29 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (69)
URL Tag Source
http://secunia.com/advisories/16502 Third Party Advisory
http://secunia.com/advisories/16679 Third Party Advisory
http://secunia.com/advisories/17252 Third Party Advisory
http://secunia.com/advisories/17813 Third Party Advisory
http://secunia.com/advisories/19072 Third Party Advisory
http://secunia.com/advisories/19193 Third Party Advisory
http://secunia.com/advisories/19532 Third Party Advisory
http://secunia.com/advisories/21522 Third Party Advisory
http://secunia.com/advisories/22691 Third Party Advisory
http://secunia.com/advisories/22875 Third Party Advisory
http://securityreason.com/securityalert/604 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm X_refsource_confirm
http://www.ethereal.com/appnotes/enpa-sa-00021.html Url Repurposed
http://www.php.net/release_4_4_1.php X_refsource_confirm
http://www.securityfocus.com/bid/14620 Vdb Entry
http://www.securityfocus.com/bid/15647 Vdb Entry
http://www.vupen.com/english/advisories/2005/1511 Vdb Entry
http://www.vupen.com/english/advisories/2005/2659 Vdb Entry
http://www.vupen.com/english/advisories/2006/0789 Vdb Entry
http://www.vupen.com/english/advisories/2006/4320 Vdb Entry
http://www.vupen.com/english/advisories/2006/4502 Vdb Entry
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11516 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1496 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1659 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A735 Signature
URL Date SRC
URL Date SRC
http://securitytracker.com/id?1014744 2024-02-14
URL Date SRC
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt 2024-02-14
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U 2024-02-14
http://docs.info.apple.com/article.html?artnum=302847 2024-02-14
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522 2024-02-14
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html 2024-02-14
http://marc.info/?l=bugtraq&m=112605112027335&w=2 2024-02-14
http://marc.info/?l=bugtraq&m=112606064317223&w=2 2024-02-14
http://marc.info/?l=bugtraq&m=130497311408250&w=2 2024-02-14
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1 2024-02-14
http://www.debian.org/security/2005/dsa-800 2024-02-14
http://www.debian.org/security/2005/dsa-817 2024-02-14
http://www.debian.org/security/2005/dsa-819 2024-02-14
http://www.debian.org/security/2005/dsa-821 2024-02-14
http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml 2024-02-14
http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml 2024-02-14
http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml 2024-02-14
http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml 2024-02-14
http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml 2024-02-14
http://www.novell.com/linux/security/advisories/2005_48_pcre.html 2024-02-14
http://www.novell.com/linux/security/advisories/2005_49_php.html 2024-02-14
http://www.novell.com/linux/security/advisories/2005_52_apache2.html 2024-02-14
http://www.redhat.com/support/errata/RHSA-2005-358.html 2024-02-14
http://www.redhat.com/support/errata/RHSA-2005-761.html 2024-02-14
http://www.redhat.com/support/errata/RHSA-2006-0197.html 2024-02-14
http://www.securityfocus.com/archive/1/427046/100/0/threaded 2024-02-14
http://www.securityfocus.com/archive/1/428138/100/0/threaded 2024-02-14
https://access.redhat.com/security/cve/CVE-2005-2491 2006-03-09
https://bugzilla.redhat.com/show_bug.cgi?id=430638 2006-03-09
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pcre
Search vendor "Pcre"
Pcre
Search vendor "Pcre" for product "Pcre"
5.0
Search vendor "Pcre" for product "Pcre" and version "5.0"
-
Affected
Pcre
Search vendor "Pcre"
Pcre
Search vendor "Pcre" for product "Pcre"
6.0
Search vendor "Pcre" for product "Pcre" and version "6.0"
-
Affected
Pcre
Search vendor "Pcre"
Pcre
Search vendor "Pcre" for product "Pcre"
6.1
Search vendor "Pcre" for product "Pcre" and version "6.1"
-
Affected