CVE-2008-0172

The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*
OR cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*
cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*

Information

Published : 2008-01-17 15:00

Updated : 2018-10-15 14:58


NVD link : CVE-2008-0172

Mitre link : CVE-2008-0172


JSON object : View

CWE
CWE-20

Improper Input Validation

Advertisement

dedicated server usa

Products Affected

ubuntu

  • ubuntu_linux

boost

  • boost