CVE-2006-7227Integer Overflow or Wraparound in Pcre

Severity
6.8MEDIUMNVD
OSV4.3
EPSS
2.3%
top 15.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 14
Latest updateMay 1

Description

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages2 packages

debiandebian/pcre3< pcre3 6.2-1 (bookworm)
NVDpcre/pcre6.6

Patches

🔴Vulnerability Details

4
GHSA
GHSA-hw27-4fxg-c8f3: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 62022-05-01
GHSA
GHSA-vqwh-px94-7wr8: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 62022-05-01
OSV
CVE-2006-7227: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 62007-11-14
OSV
CVE-2006-7228: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 62007-11-14

📋Vendor Advisories

4
Red Hat
pcre integer overflow2007-11-07
Red Hat
pcre integer overflow2007-11-07
Debian
CVE-2006-7227: pcre3 - Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7...2006
Debian
CVE-2006-7228: pcre3 - Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7...2006

💬Community

1
Bugzilla
CVE-2006-7227 pcre integer overflow2007-11-14