CVE-2005-4872Improper Restriction of Operations within the Bounds of a Memory Buffer in Pcre

Severity
4.3MEDIUMNVD
EPSS
1.5%
top 18.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 31
Latest updateMay 1

Description

Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages2 packages

debiandebian/pcre3< pcre3 6.2-1 (bookworm)
NVDpcre/pcre6.1

🔴Vulnerability Details

2
GHSA
GHSA-m5xf-8w89-qqxm: Perl-Compatible Regular Expression (PCRE) library before 62022-05-01
OSV
CVE-2005-4872: Perl-Compatible Regular Expression (PCRE) library before 62005-12-31

📋Vendor Advisories

2
Red Hat
pcre incorrect memory requirement computation2007-11-07
Debian
CVE-2005-4872: pcre3 - Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly c...2005

💬Community

1
Bugzilla
CVE-2005-4872 pcre incorrect memory requirement computation2007-11-14