Lucene search

K
ubuntucveUbuntu.comUB:CVE-2006-7227
HistoryNov 14, 2007 - 12:00 a.m.

CVE-2006-7227

2007-11-1400:00:00
ubuntu.com
ubuntu.com
9

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

89.0%

Integer overflow in Perl-Compatible Regular Expression (PCRE) library
before 6.7 allows context-dependent attackers to execute arbitrary code via
a regular expression containing a large number of named subpatterns
(name_count) or long subpattern names (max_name_size), which triggers a
buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224,
but that CVE has been REJECTED and split.

OSVersionArchitecturePackageVersionFilename
ubuntu6.06noarchpcre3< 7.4-0ubuntu0.6.06.1UNKNOWN
ubuntu6.10noarchpcre3< 7.4-0ubuntu0.6.10.1UNKNOWN
ubuntu7.04noarchpcre3< 7.4-0ubuntu0.7.04.1UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.021 Low

EPSS

Percentile

89.0%