First published: Fri Apr 13 2007(Updated: )
The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | =4.20 | |
AMaViS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2026 has been classified as a vulnerability that can lead to a denial of service due to excessive CPU consumption.
To mitigate CVE-2007-2026, update to the latest version of the affected software or apply relevant patches provided by the vendor.
The denial of service in CVE-2007-2026 is caused by the gnu regular expression code mishandling a crafted document with numerous line feed characters.
CVE-2007-2026 affects versions of Gentoo Linux's file 4.20 and AMaViS virus scanner.
Yes, CVE-2007-2026 can be exploited by context-dependent attackers through specially crafted documents.