Multiple heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library in the JavaScript engine in WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, allow remote attackers to execute arbitrary code via certain JavaScript regular expressions. NOTE: this issue was originally reported only for MobileSafari on the iPhone. NOTE: it is not clear whether this stems from an issue in the original distribution of PCRE, which might already have a separate CVE identifier.
docs.info.apple.com/article.html?artnum=306173
docs.info.apple.com/article.html?artnum=306174
secunia.com/advisories/26287
www.nytimes.com/2007/07/23/technology/23iphone.html?_r=1&adxnnl=1&adxnnlx=1185163364-1OTsRJvbylLamj17FY2wnw&oref=slogin
www.securityevaluators.com/iphone/
www.securityevaluators.com/iphone/exploitingiphone.pdf
www.securityfocus.com/bid/25002
www.securitytracker.com/id?1018439
www.vupen.com/english/advisories/2007/2730
www.vupen.com/english/advisories/2007/2731
exchange.xforce.ibmcloud.com/vulnerabilities/35577