First published: Wed Nov 07 2007(Updated: )
Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE2 (Perl Compatible Regular Expressions) | =7.0 | |
PCRE2 (Perl Compatible Regular Expressions) | =7.1 | |
PCRE2 (Perl Compatible Regular Expressions) | <=7.2 | |
Apple macOS Server | =10.4.11 | |
Apple iOS and macOS | =10.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1661 is considered a medium severity vulnerability due to the potential for denial of service and information disclosure.
To fix CVE-2007-1661, upgrade the PCRE library to version 7.3 or later.
CVE-2007-1661 affects versions of the Perl-Compatible Regular Expression library prior to 7.3 and certain versions of macOS and Mac OS X Server.
CVE-2007-1661 can allow context-dependent attackers to cause a denial of service or potentially access sensitive information.
CVE-2007-1661 is related to the Perl-Compatible Regular Expression library, which is used in multiple programming languages, particularly those that utilize regex functions.