CVE-2007-1660Improper Restriction of Operations within the Bounds of a Memory Buffer in Pcre

Severity
6.8MEDIUMNVD
EPSS
5.6%
top 9.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 7
Latest updateMay 1

Description

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

debiandebian/pcre3< glib2.0 2.14.3-1 (bookworm)
NVDpcre/pcre6.9
debiandebian/glib2.0< glib2.0 2.14.3-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-v294-5p22-v3ph: Perl-Compatible Regular Expression (PCRE) library before 72022-05-01
OSV
CVE-2007-1660: Perl-Compatible Regular Expression (PCRE) library before 72007-11-07

📋Vendor Advisories

3
Ubuntu
PCRE vulnerabilities2007-11-27
Red Hat
pcre regular expression flaws2007-11-05
Debian
CVE-2007-1660: glib2.0 - Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly c...2007

💬Community

2
Bugzilla
CVE-2007-1660 pcre regular expression flaws2007-10-02
Bugzilla
Multiple PCRE flaws2007-09-26