First published: Wed Feb 06 2008(Updated: )
Buffer overflow in PCRE before 7.6 allows remote attackers to execute arbitrary code via a regular expression containing a character class with a large number of characters with Unicode code points greater than 255.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/7.3 | <3. | 3. |
PCRE | <=7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0674 has a high severity rating as it allows remote attackers to execute arbitrary code due to a buffer overflow vulnerability.
To fix CVE-2008-0674, upgrade PCRE to version 7.6 or later, which addresses the buffer overflow issue.
CVE-2008-0674 affects all versions of PCRE prior to 7.6.
Yes, CVE-2008-0674 can be exploited remotely via specially crafted regular expressions.
Exploitation of CVE-2008-0674 could lead to arbitrary code execution, resulting in system compromise.