// For flags

CVE-2006-7228

pcre integer overflow

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

Desbordamiento de entero en librería Perl-Compatible Regular Expression (PCRE) anterior a 6.7 podría permitir a atacantes locales o remotos (dependiendo del contexto) ejecutar código de su elección mediante una expresión regular que involucra grandes valores (1) min, (2) max, o (3) duplength que provocan un cálculo incorrecto de la longitud y disparan un desbordamiento de búfer, una vulnerabilidad diferente de CVE-2006-7227. NOTA: este problema estaba incluido originalmente en CVE-2006-7224, pero ese CVE ha sido rechazado y dividido.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-11-14 CVE Reserved
  • 2007-11-14 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
  • CWE-190: Integer Overflow or Wraparound
CAPEC
References (51)
URL Tag Source
http://bugs.gentoo.org/show_bug.cgi?id=198976 X_refsource_misc
http://lists.vmware.com/pipermail/security-announce/2008/000005.html Mailing List
http://lists.vmware.com/pipermail/security-announce/2008/000014.html Mailing List
http://scary.beasts.org/security/CESA-2007-006.html X_refsource_misc
http://secunia.com/advisories/27741 Third Party Advisory
http://secunia.com/advisories/27773 Third Party Advisory
http://secunia.com/advisories/27776 Third Party Advisory
http://secunia.com/advisories/28027 Third Party Advisory
http://secunia.com/advisories/28041 Third Party Advisory
http://secunia.com/advisories/28050 Third Party Advisory
http://secunia.com/advisories/28406 Third Party Advisory
http://secunia.com/advisories/28414 Third Party Advisory
http://secunia.com/advisories/28658 Third Party Advisory
http://secunia.com/advisories/28714 Third Party Advisory
http://secunia.com/advisories/28720 Third Party Advisory
http://secunia.com/advisories/29032 Third Party Advisory
http://secunia.com/advisories/29085 Third Party Advisory
http://secunia.com/advisories/29785 Third Party Advisory
http://secunia.com/advisories/30106 Third Party Advisory
http://secunia.com/advisories/30155 Third Party Advisory
http://secunia.com/advisories/30219 Third Party Advisory
http://secunia.com/advisories/31124 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm X_refsource_confirm
http://www.pcre.org/changelog.txt X_refsource_confirm
http://www.securityfocus.com/archive/1/488457/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/490917/100/0/threaded Mailing List
http://www.securityfocus.com/bid/26462 Vdb Entry
http://www.vupen.com/english/advisories/2008/0637 Vdb Entry
http://www.vupen.com/english/advisories/2008/1234/references Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810 Signature
URL Date SRC
URL Date SRC
http://secunia.com/advisories/27582 2023-11-07
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pcre
Search vendor "Pcre"
Pcre
Search vendor "Pcre" for product "Pcre"
<= 6.6
Search vendor "Pcre" for product "Pcre" and version " <= 6.6"
-
Affected