Lucene search

K
ubuntuUbuntuUSN-591-1
HistoryMar 24, 2008 - 12:00 a.m.

libicu vulnerabilities

2008-03-2400:00:00
ubuntu.com
38

9.5 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

79.8%

Releases

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Packages

  • icu -

Details

Will Drewry discovered that libicu did not properly handle ‘\0’ when
processing regular expressions. If an application linked against libicu
processed a crafted regular expression, an attacker could execute
arbitrary code with privileges of the user invoking the program.
(CVE-2007-4770)

Will Drewry discovered that libicu did not properly limit its
backtracking stack size. If an application linked against libicu
processed a crafted regular expression, an attacker could cause a denial
of service via resource exhaustion. (CVE-2007-4771)

OSVersionArchitecturePackageVersionFilename
Ubuntu7.10noarchlibicu36< 3.6-3ubuntu0.1UNKNOWN
Ubuntu7.10noarchlibicu36-dev< 3.6-3ubuntu0.1UNKNOWN
Ubuntu7.04noarchlibicu36< 3.6-2ubuntu0.1UNKNOWN
Ubuntu7.04noarchlibicu36-dev< 3.6-2ubuntu0.1UNKNOWN
Ubuntu6.10noarchlibicu34< 3.4.1a-1ubuntu1.6.10.1UNKNOWN
Ubuntu6.10noarchlibicu34-dev< 3.4.1a-1ubuntu1.6.10.1UNKNOWN
Ubuntu6.06noarchlibicu34< 3.4.1a-1ubuntu1.6.06.1UNKNOWN
Ubuntu6.06noarchlibicu34-dev< 3.4.1a-1ubuntu1.6.06.1UNKNOWN

9.5 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

79.8%