SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   PCRE Vendors:   pcre.org
PCRE Heap Overflow May Let Users Execute Arbitrary Code
SecurityTracker Alert ID:  1014744
SecurityTracker URL:  http://securitytracker.com/id/1014744
CVE Reference:   CVE-2005-2491   (Links to External Site)
Updated:  Mar 10 2006
Original Entry Date:  Aug 20 2005
Impact:   Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.1 and prior versions
Description:   A vulnerability was reported in the PCRE library. A remote or local user may be able to execute arbitrary code on the target system.

A remote or local user may be able to supply a specially crafted regular expression to trigger a heap integer overflow in PCRE.

The impact depends on the application that uses the library. Applications that parse untrusted regular expressions may be vulnerable.

The flaw resides in 'pcre_compile.c' where certain quantifier values are not properly validated to ensure the proper values.

Impact:   The specific impact depends on the applications that use PCRE.
Solution:   The vendor has issued a fixed version (6.2), available at:

http://www.pcre.org/

Red Hat has issued a fix for Red Hat Enterprise Linux:

https://rhn.redhat.com/errata/RHSA-2005-761.html

Red Hat has issued a fix for Exim for Red Hat Enterprise Linux, which is affected by this PCRE vulnerability:

https://rhn.redhat.com/errata/RHSA-2005-358.html

Vendor URL:  www.pcre.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 6 2005 (Apache Issues Fix) PCRE Heap Overflow May Let Users Execute Arbitrary Code
Apache has issued a fix (Apache httpd is affected by this PCRE vulnerability).
Sep 9 2005 (Red Hat Issues Fix) PCRE Heap Overflow May Let Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has released a fix.
Sep 9 2005 (Red Hat Issues Fix for Exim) PCRE Heap Overflow May Let Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has released a fix for Exim, which is affected by the PCRE vulnerability.
Nov 30 2005 (Apple Issues Fix for Safari) PCRE Heap Overflow May Let Users Execute Arbitrary Code   (Apple Product Security <product-security@apple.com>)
Apple has released a fix for Safari on Mac OS X.
Mar 10 2006 (Red Hat Issues Fix for Python) PCRE Heap Overflow May Let Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has released a fix for Python on Red Hat Enterprise Linux 2.1, 3, and 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC