First published: Wed Nov 07 2007(Updated: )
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE (Perl Compatible Regular Expressions) | <=6.1 | |
PCRE (Perl Compatible Regular Expressions) | <=7.3 | |
PCRE (Perl Compatible Regular Expressions) | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.