CVE-2006-7227

Priority
Medium
Description
Integer overflow in Perl-Compatible Regular Expression (PCRE) library
before 6.7 allows context-dependent attackers to execute arbitrary code via
a regular expression containing a large number of named subpatterns
(name_count) or long subpattern names (max_name_size), which triggers a
buffer overflow. NOTE: this issue was originally subsumed by
CVE-2006-7224, but that CVE has been REJECTED and split.
References
Assigned-to
kees
Package
Source: pcre3 (LP Ubuntu Debian)
Upstream:released (6.7)
Ubuntu 8.04 LTS (Hardy Heron):not-affected
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:17:34 UTC (commit 5347)