Vulnerability Description
The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Amavis | Virus Scanner | All versions |
| Gentoo | File | 4.20 |
References
- http://secunia.com/advisories/24918
- http://secunia.com/advisories/25394
- http://secunia.com/advisories/25544
- http://secunia.com/advisories/25578
- http://sourceforge.net/mailarchive/forum.php?thread_name=755AF709E5B77E6EA58479D
- http://www.amavis.org/security/asa-2007-3.txt
- http://www.gentoo.org/security/en/glsa/glsa-200704-13.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:114
- http://www.securityfocus.com/archive/1/469520/30/6420/threaded
- http://www.securityfocus.com/bid/24146
- http://www.vupen.com/english/advisories/2007/2071
- https://bugs.gentoo.org/show_bug.cgi?id=174217
- https://issues.rpath.com/browse/RPL-1311
- http://secunia.com/advisories/24918
- http://secunia.com/advisories/25394
FAQ
What is CVE-2007-2026?
CVE-2007-2026 is a vulnerability with a CVSS score of 7.8 (HIGH). The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which...
How severe is CVE-2007-2026?
CVE-2007-2026 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2026?
Check the references section above for vendor advisories and patch information. Affected products include: Amavis Virus Scanner, Gentoo File.