// For flags

CVE-2007-1661

 

Severity Score

6.4
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.

La librería Perl-Compatible Regular Expression (PCRE) anterior a 7.3 vuelve demasiado atrás cuando compara determinados bytes de entrada con algunos patrones de expresiones regulares en modo no-UTF-8, lo cual permite a atacantes locales o remotos (dependiendo del contexto) obtener información sensible o provocar una denegación de servicio (caída), como se ha demostrado mediante los patrones "\X?\d" y "\P{L}?\d".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-03-24 CVE Reserved
  • 2007-11-06 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (44)
URL Date SRC
URL Date SRC
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html 2018-10-16
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html 2018-10-16
http://secunia.com/advisories/27538 2018-10-16
http://secunia.com/advisories/27543 2018-10-16
http://secunia.com/advisories/27554 2018-10-16
http://secunia.com/advisories/27697 2018-10-16
http://secunia.com/advisories/27741 2018-10-16
http://secunia.com/advisories/27773 2018-10-16
http://secunia.com/advisories/28136 2018-10-16
http://secunia.com/advisories/28406 2018-10-16
http://secunia.com/advisories/28414 2018-10-16
http://secunia.com/advisories/28714 2018-10-16
http://secunia.com/advisories/28720 2018-10-16
http://secunia.com/advisories/29267 2018-10-16
http://secunia.com/advisories/29420 2018-10-16
http://secunia.com/advisories/30106 2018-10-16
http://secunia.com/advisories/30155 2018-10-16
http://secunia.com/advisories/30219 2018-10-16
http://security.gentoo.org/glsa/glsa-200711-30.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200801-02.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200801-18.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200801-19.xml 2018-10-16
http://security.gentoo.org/glsa/glsa-200805-11.xml 2018-10-16
http://www.debian.org/security/2008/dsa-1570 2018-10-16
http://www.mandriva.com/security/advisories?name=MDKSA-2007:211 2018-10-16
http://www.novell.com/linux/security/advisories/2007_62_pcre.html 2018-10-16
https://usn.ubuntu.com/547-1 2018-10-16
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00181.html 2018-10-16
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pcre
Search vendor "Pcre"
Perl-compatible Regular Expression Library
Search vendor "Pcre" for product "Perl-compatible Regular Expression Library"
<= 7.2
Search vendor "Pcre" for product "Perl-compatible Regular Expression Library" and version " <= 7.2"
-
Affected
Pcre
Search vendor "Pcre"
Perl-compatible Regular Expression Library
Search vendor "Pcre" for product "Perl-compatible Regular Expression Library"
7.0
Search vendor "Pcre" for product "Perl-compatible Regular Expression Library" and version "7.0"
-
Affected
Pcre
Search vendor "Pcre"
Perl-compatible Regular Expression Library
Search vendor "Pcre" for product "Perl-compatible Regular Expression Library"
7.1
Search vendor "Pcre" for product "Perl-compatible Regular Expression Library" and version "7.1"
-
Affected
Apple
Search vendor "Apple"
Mac Os X
Search vendor "Apple" for product "Mac Os X"
10.4.11
Search vendor "Apple" for product "Mac Os X" and version "10.4.11"
-
Affected
Apple
Search vendor "Apple"
Mac Os X Server
Search vendor "Apple" for product "Mac Os X Server"
10.4.11
Search vendor "Apple" for product "Mac Os X Server" and version "10.4.11"
-
Affected