First published: Wed Nov 14 2007(Updated: )
<a href="https://access.redhat.com/security/cve/CVE-2006-7224">CVE-2006-7224</a> initially described several integer overflows in pcre, all described here: <a href="http://scary.beasts.org/security/CESA-2007-006.html">http://scary.beasts.org/security/CESA-2007-006.html</a> This id should be used to describe issue #2 in that advisory: 2) Uncharacterized crash researching item #1 above: Demo: (?P<0>)(?P<1>)...fill in this sequence...(?P<3999>) This does not trigger the integer overflow present in #1 above, but still crashes with a serious-looking memory error of some kind - possibly a buffer overflow.
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-383361 is classified as critical due to its potential for integer overflow leading to security risks.
To address the vulnerability REDHAT-BUG-383361, update PCRE to the latest version provided by your vendor.
The vulnerability REDHAT-BUG-383361 affects systems running PCRE with the specific versions vulnerable to integer overflow.
Exploiting vulnerability REDHAT-BUG-383361 could allow an attacker to execute arbitrary code on the affected system.
While specific exploits for REDHAT-BUG-383361 may not be publicly documented, the nature of integer overflow vulnerabilities often leads to exploit development.