Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2005-08-22T04:00:00
Updated: 2024-08-07T22:30:01.424Z
Reserved: 2005-08-08T00:00:00
Link: CVE-2005-2491
Vulnrichment
No data.
NVD
Status : Modified
Published: 2005-08-23T04:00:00.000
Modified: 2024-11-20T23:59:40.840
Link: CVE-2005-2491
Redhat