CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
94.9%
Integer overflow in the PCRE regular expression compiler (JavaScriptCore/pcre/pcre_compile.cpp) in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to execute arbitrary code via a regular expression with large, nested repetition counts, which triggers a heap-based buffer overflow.
Vendor | Product | Version | CPE |
---|---|---|---|
apple | mac_os_x | 10.4.11 | cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:* |
apple | mac_os_x | 10.5.2 | cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:* |
apple | mac_os_x_server | 10.4.11 | cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:* |
apple | mac_os_x_server | 10.5.2 | cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:* |
microsoft | windows_vista | * | cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:* |
microsoft | windows_xp | * | cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:* |
apple | safari | 3 | cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:* |
apple | safari | 3.1 | cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:* |
lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
lists.apple.com/archives/security-announce/2008/Apr/msg00001.html
secunia.com/advisories/29846
secunia.com/advisories/31074
securityreason.com/securityalert/3815
support.apple.com/kb/HT1467
www.securityfocus.com/archive/1/490990/100/0/threaded
www.securityfocus.com/bid/28815
www.securitytracker.com/id?1019870
www.vupen.com/english/advisories/2008/1250/references
www.vupen.com/english/advisories/2008/2094/references
www.zerodayinitiative.com/advisories/ZDI-08-022
exchange.xforce.ibmcloud.com/vulnerabilities/41859