First published: Thu Jan 22 2015(Updated: )
The Regular Expressions package in International Components for Unicode (ICU) allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server Supplementary | =6.0 | |
Red Hat Enterprise Linux Server Supplementary EUS | =6.6.z | |
Red Hat Enterprise Linux Workstation Supplementary | =6.0 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
ICU (International Components for Unicode) | <55.1 | |
Sun iPlanet Messaging Server | =7.0.5 | |
Sun iPlanet Messaging Server | =8.0 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Google Chrome | <=40.0.2214.85 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7923 has a severity rating that indicates it can lead to remote denial of service due to memory corruption.
To fix CVE-2014-7923, updating to the latest version of the affected software that addresses the vulnerability is recommended.
CVE-2014-7923 affects various versions of the ICU Regular Expressions package and specific releases of Red Hat Enterprise Linux and openSUSE.
You can determine if your system is vulnerable to CVE-2014-7923 by checking if it runs an affected version of ICU or the listed operating systems.
CVE-2014-7923 can be exploited to cause denial of service through specially crafted look-behind expressions in regular expressions.