First published: Wed Nov 07 2007(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2006-7224">CVE-2006-7224</a> initially described several integer overflows in pcre, all described here: <a href="http://scary.beasts.org/security/CESA-2007-006.html">http://scary.beasts.org/security/CESA-2007-006.html</a> This id should be used to describe issue #1 in that advisory: 1) Integer overflow leading to buffer overflow. pcre_compile: --- /* Compute the size of data block needed and get it, either from malloc or externally provided function. */ size = length + sizeof(real_pcre) + name_count * (max_name_size + 3); re = (real_pcre *)(pcre_malloc)(size); --- Unfortunately, a malicious regex can easily cause large "name_count" and "max_name_size" such that this calculation overflows. Demo: (?P)(?P<0>)(?P<1>)...fill in this sequence...(?P<4293>)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <0:4.5-4.el4_5.4 | 0:4.5-4.el4_5.4 |
redhat/pcre | <0:6.6-2.el5_1.1 | 0:6.6-2.el5_1.1 |
PCRE | <=6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-7227 is classified as a high-severity vulnerability due to the integer overflow issues in PCRE.
To fix CVE-2006-7227, update the pcre package to versions 0:4.5-4.el4_5.4 or 0:6.6-2.el5_1.1.
Versions of PCRE up to and including 6.6 are affected by CVE-2006-7227.
CVE-2006-7227 is an integer overflow vulnerability that can lead to potential code execution.
CVE-2006-7227 may be remotely exploitable depending on how the PCRE library is used in applications.