SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   PCRE Vendors:   pcre.org
PCRE Regex Processing Bugs May Let Users Execute Arbitrary Code
SecurityTracker Alert ID:  1018895
SecurityTracker URL:  http://securitytracker.com/id/1018895
CVE Reference:   CVE-2007-1659, CVE-2007-1660   (Links to External Site)
Date:  Nov 6 2007
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 7.0
Description:   Two vulnerabilities were reported in PCRE. A local or remote user can execute arbitrary code on the target system.

A remote or local user may be able to supply a specially crafted regular expression to trigger a memory in PCRE.

The impact depends on the application that uses the library. Applications that parse untrusted regular expressions may be vulnerable.

Unmatched \Q\E sequences with orphan \E codes can cause code execution [CVE-2007-1659].

Certain character classes can trigger code execution [CVE-2007-1660].

Tavis Ormandy reported these vulnerabilities.

Impact:   A local or remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fixed version (7.3).
Vendor URL:  www.pcre.org/ (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 6 2007 (Red Hat Issues Fix) PCRE Regex Processing Bugs May Let Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 4.
Nov 6 2007 (Red Hat Issues Fix) PCRE Regex Processing Bugs May Let Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 5.
Nov 29 2007 (Red Hat Issues Fix) PCRE Regex Processing Bugs May Let Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 3.
Apr 16 2008 (VMware Issues Fix for ESX Server) PCRE Regex Processing Bugs May Let Users Execute Arbitrary Code
VMware issued a fix for VMware ESX 3.5.
Jul 16 2008 (Red Hat Issues Fix for PHP) PCRE Regex Processing Bugs May Let Users Execute Arbitrary Code
Red Hat has released a fix for PHP on Red Hat Enterprise Linux 2.1.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC