CVE-2005-4872

CVE Details

Release Date:2005-12-31
Impact:Important What is this?

Description


Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

See more information about CVE-2005-4872 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 4.3
Vector String: AV:N/AC:M/Au:N/C:N/I:N/A:P
Version: 2.0
Attack Vector: Network
Attack Complexity: Medium
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Errata information


PlatformErrataRelease Date
Oracle Enterprise Linux version 4 (pcre)ELSA-2007-10522007-11-10
Oracle Linux version 5 (pcre)ELSA-2007-10522007-11-10


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete