CVE-2006-7225Improper Input Validation in Pcre

Severity
4.3MEDIUMNVD
EPSS
1.3%
top 20.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 3
Latest updateMay 1

Description

Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

NVDperl/pcre52 versions+51
debiandebian/pcre3< glib2.0 2.14.3-1 (bookworm)
debiandebian/glib2.0< glib2.0 2.14.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jwp9-5mxp-g76g: Perl-Compatible Regular Expression (PCRE) library before 62022-05-01
OSV
CVE-2006-7225: Perl-Compatible Regular Expression (PCRE) library before 62007-12-03

📋Vendor Advisories

2
Red Hat
pcre miscalculation of memory requirements for malformed Posix character class2007-11-13
Debian
CVE-2006-7225: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-depe...2006

💬Community

1
Bugzilla
CVE-2006-7225 pcre miscalculation of memory requirements for malformed Posix character class2007-11-15