First published: Wed Nov 07 2007(Updated: )
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1659 is classified as a vulnerability that can lead to denial of service and potentially arbitrary code execution.
To fix CVE-2007-1659, upgrade the PCRE library to version 7.3 or later.
CVE-2007-1659 affects users of the Perl-Compatible Regular Expression (PCRE) library versions prior to 7.3.
CVE-2007-1659 facilitates context-dependent attacks that can crash applications using the vulnerable PCRE library.
Yes, there are known exploits that demonstrate how to crash applications or potentially execute arbitrary code using malformed regex patterns.