Vulnerability Description
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pcre | Pcre | <= 6.0 |
Related Weaknesses (CWE)
References
- http://bugs.gentoo.org/show_bug.cgi?id=198976
- http://docs.info.apple.com/article.html?artnum=307179
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html
- http://mail.gnome.org/archives/gtk-devel-list/2007-November/msg00022.html
- http://secunia.com/advisories/27538
- http://secunia.com/advisories/27543
- http://secunia.com/advisories/27554
- http://secunia.com/advisories/27697
- http://secunia.com/advisories/27741
- http://secunia.com/advisories/28136
- http://secunia.com/advisories/28157
- http://secunia.com/advisories/28161
FAQ
What is CVE-2007-4768?
CVE-2007-4768 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character ...
How severe is CVE-2007-4768?
CVE-2007-4768 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4768?
Check the references section above for vendor advisories and patch information. Affected products include: Pcre Pcre.