Lucene search

K
cve[email protected]CVE-2006-7227
HistoryNov 14, 2007 - 9:46 p.m.

CVE-2006-7227

2007-11-1421:46:00
CWE-189
web.nvd.nist.gov
41
4
nvd
cve-2006-7227
pcre
buffer overflow
arbitrary code execution

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.5

Confidence

Low

EPSS

0.021

Percentile

89.2%

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.

Affected configurations

NVD
Node
pcrepcreRange6.6
VendorProductVersionCPE
pcrepcrecpe:/a:pcre:pcre::::

References

Social References

More

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.5

Confidence

Low

EPSS

0.021

Percentile

89.2%