First published: Thu Jan 17 2008(Updated: )
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =6.06_lts | |
Ubuntu | =6.10 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Boost C++ Libraries | =1.33 | |
Boost C++ Libraries | =1.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0172 has a severity rating that indicates it can lead to a denial of service due to a NULL dereference and application crash.
To mitigate CVE-2008-0172, update to a fixed version of the Boost.Regex library, specifically version 1.35 or later.
CVE-2008-0172 specifically affects Boost versions 1.33 and 1.34.
CVE-2008-0172 allows context-dependent attackers to cause a denial of service by inputting an invalid regular expression.
The specific versions of Ubuntu Linux mentioned are not vulnerable to CVE-2008-0172, as they do not use the affected Boost library versions.