// For flags

CVE-2008-0674

 

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.

Desbordamiento de búfer en PCRE antes de 7.6 permite a atacantes remotos ejecutar código de su elección a través de una expresión regular que contiene un carácter class con un número grande de caracteres con puntos de código Unicode mayores de 255.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-02-11 CVE Reserved
  • 2008-02-18 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-11-14 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (54)
URL Tag Source
http://ftp.gnome.org/pub/gnome/sources/glib/2.14/glib-2.14.6.news X_refsource_confirm
http://pcre.org/changelog.txt X_refsource_confirm
http://secunia.com/advisories/28923 Third Party Advisory
http://secunia.com/advisories/28957 Third Party Advisory
http://secunia.com/advisories/28960 Third Party Advisory
http://secunia.com/advisories/28985 Third Party Advisory
http://secunia.com/advisories/28996 Third Party Advisory
http://secunia.com/advisories/29027 Third Party Advisory
http://secunia.com/advisories/29048 Third Party Advisory
http://secunia.com/advisories/29175 Third Party Advisory
http://secunia.com/advisories/29267 Third Party Advisory
http://secunia.com/advisories/29282 Third Party Advisory
http://secunia.com/advisories/30048 Third Party Advisory
http://secunia.com/advisories/30345 Third Party Advisory
http://secunia.com/advisories/31326 Third Party Advisory
http://secunia.com/advisories/32222 Third Party Advisory
http://secunia.com/advisories/32746 Third Party Advisory
http://secunia.com/advisories/36096 Third Party Advisory
http://support.apple.com/kb/HT3216 X_refsource_confirm
http://support.apple.com/kb/HT3757 X_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0086 X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0086 X_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176 X_refsource_confirm
http://www.openwall.com/lists/oss-security/2008/05/02/2 Mailing List
http://www.php.net/ChangeLog-5.php X_refsource_confirm
http://www.securityfocus.com/archive/1/488927/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/492535/100/0/threaded Mailing List
http://www.securityfocus.com/bid/27786 Vdb Entry
http://www.securityfocus.com/bid/29009 Vdb Entry
http://www.securityfocus.com/bid/31681 Vdb Entry
http://www.securitytracker.com/id?1022674 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA09-218A.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/0570 Vdb Entry
http://www.vupen.com/english/advisories/2008/0592 Vdb Entry
http://www.vupen.com/english/advisories/2008/1412 Vdb Entry
http://www.vupen.com/english/advisories/2008/2268 Vdb Entry
http://www.vupen.com/english/advisories/2008/2780 Vdb Entry
http://www.vupen.com/english/advisories/2009/2172 Vdb Entry
https://bugzilla.redhat.com/show_bug.cgi?id=431660 X_refsource_confirm
https://exchange.xforce.ibmcloud.com/vulnerabilities/40505 Vdb Entry
https://issues.rpath.com/browse/RPL-2223 X_refsource_confirm
https://issues.rpath.com/browse/RPL-2503 X_refsource_confirm
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pcre
Search vendor "Pcre"
Pcre
Search vendor "Pcre" for product "Pcre"
<= 7.5
Search vendor "Pcre" for product "Pcre" and version " <= 7.5"
-
Affected