TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2005-2491

N/A

Beschreibung

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

CVE Details

CVSS v3.1 BewertungN/A
Veroffentlicht8/23/2005
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

pcre:pcre

Referenzen

http://docs.info.apple.com/article.html?artnum=302847(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=112605112027335&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=112606064317223&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=130497311408250&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/16502(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/16679(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17252(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17813(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19072(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19193(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19532(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21522(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22691(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22875(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/604(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1014744(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-800(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-817(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-819(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-821(af854a3a-2127-422b-91ae-364da2661108)
http://www.ethereal.com/appnotes/enpa-sa-00021.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.php.net/release_4_4_1.php(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-358.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-761.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0197.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/14620(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/15647(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/1511(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/2659(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/0789(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4320(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4502(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.