// For flags

CVE-2007-1660

pcre regular expression flaws

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.

La biblioteca Perl-Compatible Regular Expression (PCRE) anterior a la versión 7.0 no calcula apropiadamente los tamaños de las "multiple forms of character class" no especificadas, lo que desencadena un desbordamiento de búfer que permite a los atacantes dependiendo del contexto provocar una denegación de servicio (bloqueo) y posiblemente ejecutar código arbitrario.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-03-24 CVE Reserved
  • 2007-11-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (66)
URL Tag Source
http://bugs.gentoo.org/show_bug.cgi?id=198976 X_refsource_misc
http://docs.info.apple.com/article.html?artnum=307179 X_refsource_confirm
http://docs.info.apple.com/article.html?artnum=307562 X_refsource_confirm
http://lists.vmware.com/pipermail/security-announce/2008/000014.html Mailing List
http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html Mailing List
http://secunia.com/advisories/30106 Third Party Advisory
http://secunia.com/advisories/30155 Third Party Advisory
http://secunia.com/advisories/30219 Third Party Advisory
http://secunia.com/advisories/31124 Third Party Advisory
http://securitytracker.com/id?1018895 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2007-488.htm X_refsource_confirm
http://www.securityfocus.com/archive/1/483357/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/483579/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/490917/100/0/threaded Mailing List
http://www.us-cert.gov/cas/techalerts/TA07-352A.html Third Party Advisory
http://www.vupen.com/english/advisories/2007/3725 Vdb Entry
http://www.vupen.com/english/advisories/2007/3790 Vdb Entry
http://www.vupen.com/english/advisories/2007/4238 Vdb Entry
http://www.vupen.com/english/advisories/2008/0924/references Vdb Entry
http://www.vupen.com/english/advisories/2008/1234/references Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/38273 Vdb Entry
https://issues.rpath.com/browse/RPL-1738 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10562 Signature
URL Date SRC
URL Date SRC
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html 2018-10-16
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html 2018-10-16
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html 2018-10-16
http://secunia.com/advisories/27538 2018-10-16
http://secunia.com/advisories/27543 2018-10-16
http://secunia.com/advisories/27547 2018-10-16
http://secunia.com/advisories/27554 2018-10-16
http://secunia.com/advisories/27598 2018-10-16
http://secunia.com/advisories/27697 2018-10-16
http://secunia.com/advisories/27741 2018-10-16
http://secunia.com/advisories/27773 2018-10-16
http://secunia.com/advisories/27776 2018-10-16
http://secunia.com/advisories/27862 2018-10-16
http://secunia.com/advisories/27965 2018-10-16
http://secunia.com/advisories/28136 2018-10-16
http://secunia.com/advisories/28406 2018-10-16
http://secunia.com/advisories/28414 2018-10-16
http://secunia.com/advisories/28658 2018-10-16
http://secunia.com/advisories/28714 2018-10-16
http://secunia.com/advisories/28720 2018-10-16
http://secunia.com/advisories/29420 2018-10-16
http://secunia.com/advisories/29785 2018-10-16
http://security.gentoo.org/glsa/glsa-200711-30.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200801-02.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200801-18.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200801-19.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200805-11.xml 2018-10-16
http://www.debian.org/security/2008/dsa-1570 2018-10-16
http://www.mandriva.com/security/advisories?name=MDKSA-2007:211 2018-10-16
http://www.mandriva.com/security/advisories?name=MDKSA-2007:212 2018-10-16
http://www.mandriva.com/security/advisories?name=MDKSA-2007:213 2018-10-16
http://www.novell.com/linux/security/advisories/2007_25_sr.html 2018-10-16
http://www.novell.com/linux/security/advisories/2007_62_pcre.html 2018-10-16
http://www.redhat.com/support/errata/RHSA-2007-0967.html 2018-10-16
http://www.redhat.com/support/errata/RHSA-2007-0968.html 2018-10-16
http://www.redhat.com/support/errata/RHSA-2007-1063.html 2018-10-16
http://www.redhat.com/support/errata/RHSA-2007-1065.html 2018-10-16
http://www.redhat.com/support/errata/RHSA-2008-0546.html 2018-10-16
https://bugzilla.redhat.com/show_bug.cgi?id=315881 2008-07-16
https://usn.ubuntu.com/547-1 2018-10-16
https://access.redhat.com/security/cve/CVE-2007-1660 2008-07-16
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pcre
Search vendor "Pcre"
Pcre
Search vendor "Pcre" for product "Pcre"
<= 6.9
Search vendor "Pcre" for product "Pcre" and version " <= 6.9"
-
Affected