CVE-2006-7230Pcre vulnerability

CWE-1896 documents6 sources
Severity
4.3MEDIUMNVD
EPSS
2.8%
top 13.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 15
Latest updateMay 1

Description

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages2 packages

debiandebian/pcre3< pcre3 7.0-1 (bookworm)
NVDpcre/pcre6.9

🔴Vulnerability Details

2
GHSA
GHSA-64q5-vm73-jhjp: Perl-Compatible Regular Expression (PCRE) library before 72022-05-01
OSV
CVE-2006-7230: Perl-Compatible Regular Expression (PCRE) library before 72007-11-15

📋Vendor Advisories

2
Red Hat
pcre miscalculation of memory requirements if options are changed during pattern compilation2007-11-20
Debian
CVE-2006-7230: pcre3 - Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly c...2006

💬Community

1
Bugzilla
CVE-2006-7230 pcre miscalculation of memory requirements if options are changed during pattern compilation2007-11-15