CVE-2006-7227 — Integer Overflow or Wraparound in Pcre
Severity
6.8MEDIUMNVD
OSV4.3
EPSS
2.3%
top 15.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 14
Latest updateMay 1
Description
Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages2 packages
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-hw27-4fxg-c8f3: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6↗2022-05-01
GHSA▶
GHSA-vqwh-px94-7wr8: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6↗2022-05-01
OSV▶
CVE-2006-7227: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6↗2007-11-14
OSV▶
CVE-2006-7228: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6↗2007-11-14