Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   Apache HTTPD Vendors:   Apache Software Foundation
(Apache Issues Fix) PCRE Heap Overflow May Let Users Execute Arbitrary Code
SecurityTracker Alert ID:  1014853
SecurityTracker URL:
CVE Reference:   CVE-2005-2491   (Links to External Site)
Date:  Sep 6 2005
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.1 and prior versions
Description:   A vulnerability was reported in the PCRE library. A remote or local user may be able to execute arbitrary code on the target system. The apache web server is affected.

A remote or local user may be able to supply a specially crafted regular expression to trigger a heap integer overflow in PCRE.

The impact depends on the application that uses the library. Applications that parse untrusted regular expressions may be vulnerable.

The flaw resides in 'pcre_compile.c' where certain quantifier values are not properly validated to ensure the proper values.

Impact:   The specific impact depends on the applications that use PCRE.
Solution:   A fixed version (2.0.55-dev) is available at:

Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Aug 20 2005 PCRE Heap Overflow May Let Users Execute Arbitrary Code

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC