Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
References
Configurations
Information
Published : 2007-11-15 11:46
Updated : 2017-10-10 18:31
NVD link : CVE-2006-7230
Mitre link : CVE-2006-7230
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
pcre
- pcre