CVE-2007-4768Improper Restriction of Operations within the Bounds of a Memory Buffer in Pcre

Severity
6.8MEDIUMNVD
EPSS
9.6%
top 7.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 7
Latest updateMay 1

Description

Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

debiandebian/pcre3< glib2.0 2.14.3-1 (bookworm)
NVDpcre/pcre6.0+2
debiandebian/glib2.0< glib2.0 2.14.3-1 (bookworm)

🔴Vulnerability Details

2
GHSA
GHSA-jq5c-rgv9-cw8p: Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 72022-05-01
OSV
CVE-2007-4768: Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 72007-11-07

📋Vendor Advisories

3
Ubuntu
PCRE vulnerabilities2007-11-27
Red Hat
: pcre before 7.3 incorrect unicode in char class optimization2007-11-05
Debian
CVE-2007-4768: glib2.0 - Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library ...2007

💬Community

2
Bugzilla
CVE-2007-4768: pcre before 7.3 incorrect unicode in char class optimization2007-11-20
Bugzilla
Multiple PCRE flaws2007-09-26