First published: Wed Nov 07 2007(Updated: )
Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE | <=7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4766 is considered a high severity vulnerability due to its potential for causing denial of service and executing arbitrary code.
To fix CVE-2007-4766, update the PCRE library to version 7.3 or later, as this version addresses the integer overflow issues.
CVE-2007-4766 affects versions of the PCRE (Perl-Compatible Regular Expressions) library prior to 7.3.
CVE-2007-4766 enables context-dependent attackers to cause a denial of service or execute arbitrary code via specific escape sequences.
Yes, a patch is available by updating to PCRE versions 7.3 or higher, which resolve the vulnerabilities associated with CVE-2007-4766.