CVE-2006-7228Integer Overflow or Wraparound in Pcre

Severity
6.8MEDIUMNVD
OSV4.3
EPSS
2.2%
top 15.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 14
Latest updateMay 1

Description

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages2 packages

debiandebian/pcre3< pcre3 6.2-1 (bookworm)
NVDpcre/pcre6.6

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hw27-4fxg-c8f3: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 62022-05-01
OSV
CVE-2006-7228: Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 62007-11-14

📋Vendor Advisories

2
Red Hat
pcre integer overflow2007-11-07
Debian
CVE-2006-7228: pcre3 - Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7...2006

💬Community

1
Bugzilla
CVE-2006-7228 pcre integer overflow2007-11-14