Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2008-2371
Description:Heap-based buffer overflow in pcre_compile.c in the Perl-Compatible Regular Expression (PCRE) library 7.7 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a regular expression that begins with an option and contains multiple branches.
Test IDs: 1.3.6.1.4.1.25623.1.0.61311   1.3.6.1.4.1.25623.1.0.61250   1.3.6.1.4.1.25623.1.0.61243   1.3.6.1.4.1.25623.1.0.61501   1.3.6.1.4.1.25623.1.0.61248   1.3.6.1.4.1.25623.1.0.62852   1.3.6.1.4.1.25623.1.0.61242   1.3.6.1.4.1.25623.1.0.61234   1.3.6.1.4.1.25623.1.0.61239   1.3.6.1.4.1.25623.1.0.61469   1.3.6.1.4.1.25623.1.0.67279  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2008-2371
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
BugTraq ID: 30087
http://www.securityfocus.com/bid/30087
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
Bugtraq: 20081027 rPSA-2008-0305-1 pcre (Google Search)
http://www.securityfocus.com/archive/1/497828/100/0/threaded
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Debian Security Information: DSA-1602 (Google Search)
http://www.debian.org/security/2008/dsa-1602
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00105.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00123.html
http://www.gentoo.org/security/en/glsa/glsa-200807-03.xml
http://security.gentoo.org/glsa/glsa-200811-05.xml
HPdes Security Advisory: HPSBUX02431
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT090085
http://marc.info/?l=bugtraq&m=124654546101607&w=2
HPdes Security Advisory: SSRT090192
http://marc.info/?l=bugtraq&m=125631037611762&w=2
http://www.mandriva.com/security/advisories?name=MDVSA-2008:147
http://www.mandriva.com/security/advisories?name=MDVSA-2009:023
http://secunia.com/advisories/30916
http://secunia.com/advisories/30944
http://secunia.com/advisories/30945
http://secunia.com/advisories/30958
http://secunia.com/advisories/30961
http://secunia.com/advisories/30967
http://secunia.com/advisories/30972
http://secunia.com/advisories/30990
http://secunia.com/advisories/31200
http://secunia.com/advisories/32222
http://secunia.com/advisories/32454
http://secunia.com/advisories/32746
http://secunia.com/advisories/35074
http://secunia.com/advisories/35650
http://secunia.com/advisories/39300
SuSE Security Announcement: SUSE-SR:2008:014 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
http://www.ubuntu.com/usn/usn-624-1
http://ubuntu.com/usn/usn-624-2
http://www.ubuntu.com/usn/usn-628-1
http://www.vupen.com/english/advisories/2008/2005
http://www.vupen.com/english/advisories/2008/2006
http://www.vupen.com/english/advisories/2008/2336
http://www.vupen.com/english/advisories/2008/2780
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2010/0833




© 1998-2024 E-Soft Inc. All rights reserved.