First published: Wed Jan 09 2008(Updated: )
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL JDBC Driver | >=7.4<7.4.19 | |
PostgreSQL JDBC Driver | >=8.0<8.0.15 | |
PostgreSQL JDBC Driver | >=8.1<8.1.11 | |
PostgreSQL JDBC Driver | >=8.2<8.2.6 | |
TCL tcl\/tk | <8.4.17 | |
Debian GNU/Linux | =3.1 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.10 | |
Ubuntu Linux | =7.04 | |
Ubuntu Linux | =7.10 | |
PostgreSQL | >=7.4<7.4.19 | |
PostgreSQL | >=8.0<8.0.15 | |
PostgreSQL | >=8.1<8.1.11 | |
PostgreSQL | >=8.2<8.2.6 | |
Tcl/Tk | <8.4.17 | |
Debian Linux | =3.1 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4772 is classified as a denial of service vulnerability due to its potential to cause an infinite loop.
To fix CVE-2007-4772, update to PostgreSQL version 8.2.6 or later, or upgrade Tcl to version 8.4.17 or later.
CVE-2007-4772 affects PostgreSQL versions 7.4 prior to 7.4.19, 8.0 prior to 8.0.15, 8.1 prior to 8.1.11, and 8.2 prior to 8.2.6, as well as Tcl before 8.4.17.
Yes, CVE-2007-4772 can be exploited by remote attackers through crafted regular expressions.
The potential impacts of CVE-2007-4772 include service outages and degraded performance due to denial of service.