CVE-2005-2491
Published Aug 23, 2005
Last updated 9 months ago
Overview
- Description
- Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Vendor comments
- ApacheFixed in Apache 2.0.55: http://httpd.apache.org/security/vulnerabilities_20.html
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E71EAB3-BEFE-4442-A18A-F2739DE3B0BA" }, { "criteria": "cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F23E7A02-29EF-41CE-9E05-9224F832BAC6" }, { "criteria": "cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC32309-4E60-4A56-808E-5494B1CD3D2F" } ], "operator": "OR" } ] } ]