HIGH · 7.8

CVE-2007-2026

The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which...

Vulnerability Description

The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.

CVSS Score

7.8

HIGH

AV:N/AC:L/Au:N/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
AmavisVirus ScannerAll versions
GentooFile4.20

References

FAQ

What is CVE-2007-2026?

CVE-2007-2026 is a vulnerability with a CVSS score of 7.8 (HIGH). The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which...

How severe is CVE-2007-2026?

CVE-2007-2026 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2007-2026?

Check the references section above for vendor advisories and patch information. Affected products include: Amavis Virus Scanner, Gentoo File.