First published: Wed Nov 07 2007(Updated: )
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE | <=6.1 | |
PCRE | <=7.3 | |
PCRE | <=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4768 is rated as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2007-4768, update the PCRE library to version 7.4 or later.
CVE-2007-4768 affects all versions of PCRE prior to 7.4.
CVE-2007-4768 can be exploited by context-dependent attackers using specially crafted regex patterns.
CVE-2007-4768 allows attackers to execute arbitrary code on vulnerable systems.