Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-7228 (GCVE-0-2006-7228)
Vulnerability from cvelistv5 – Published: 2007-11-14 21:00 – Updated: 2024-08-07 20:57- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:57:40.778Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"name": "30219",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30219"
},
{
"name": "27776",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27776"
},
{
"name": "GLSA-200711-30",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
},
{
"name": "28050",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28050"
},
{
"name": "MDVSA-2008:030",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"name": "RHSA-2008:0546",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0546.html"
},
{
"name": "DSA-1570",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"name": "SUSE-SA:2008:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"name": "28658",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28658"
},
{
"name": "27773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27773"
},
{
"name": "28406",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28406"
},
{
"name": "20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/490917/100/0/threaded"
},
{
"name": "29032",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29032"
},
{
"name": "RHSA-2007:1065",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1065.html"
},
{
"name": "31124",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31124"
},
{
"name": "29085",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29085"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"name": "RHSA-2007:1077",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html"
},
{
"name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
},
{
"name": "26462",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26462"
},
{
"name": "29785",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/29785"
},
{
"name": "RHSA-2007:1076",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html"
},
{
"name": "RHSA-2007:1068",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"name": "ADV-2008-0637",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0637"
},
{
"name": "GLSA-200805-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"name": "RHSA-2007:1059",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"name": "ADV-2008-1234",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1234/references"
},
{
"name": "28041",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28041"
},
{
"name": "GLSA-200802-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200802-10.xml"
},
{
"name": "28027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28027"
},
{
"name": "27741",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27741"
},
{
"name": "oval:org.mitre.oval:def:10810",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810"
},
{
"name": "MDVSA-2008:012",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012"
},
{
"name": "SUSE-SA:2007:062",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.pcre.org/changelog.txt"
},
{
"name": "30155",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30155"
},
{
"name": "RHSA-2007:1063",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1063.html"
},
{
"name": "28720",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28720"
},
{
"name": "GLSA-200801-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"name": "27582",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27582"
},
{
"name": "[Security-announce] 20080415 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://scary.beasts.org/security/CESA-2007-006.html"
},
{
"name": "GLSA-200801-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"name": "GLSA-200801-18",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"name": "28414",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28414"
},
{
"name": "30106",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30106"
},
{
"name": "28714",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28714"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-16T14:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"name": "30219",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30219"
},
{
"name": "27776",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27776"
},
{
"name": "GLSA-200711-30",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
},
{
"name": "28050",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28050"
},
{
"name": "MDVSA-2008:030",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"name": "RHSA-2008:0546",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0546.html"
},
{
"name": "DSA-1570",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"name": "SUSE-SA:2008:004",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"name": "28658",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28658"
},
{
"name": "27773",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27773"
},
{
"name": "28406",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28406"
},
{
"name": "20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/490917/100/0/threaded"
},
{
"name": "29032",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29032"
},
{
"name": "RHSA-2007:1065",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1065.html"
},
{
"name": "31124",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31124"
},
{
"name": "29085",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29085"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"name": "RHSA-2007:1077",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html"
},
{
"name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
},
{
"name": "26462",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26462"
},
{
"name": "29785",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/29785"
},
{
"name": "RHSA-2007:1076",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html"
},
{
"name": "RHSA-2007:1068",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"name": "ADV-2008-0637",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0637"
},
{
"name": "GLSA-200805-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"name": "RHSA-2007:1059",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"name": "ADV-2008-1234",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1234/references"
},
{
"name": "28041",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28041"
},
{
"name": "GLSA-200802-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200802-10.xml"
},
{
"name": "28027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28027"
},
{
"name": "27741",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27741"
},
{
"name": "oval:org.mitre.oval:def:10810",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810"
},
{
"name": "MDVSA-2008:012",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012"
},
{
"name": "SUSE-SA:2007:062",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.pcre.org/changelog.txt"
},
{
"name": "30155",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30155"
},
{
"name": "RHSA-2007:1063",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1063.html"
},
{
"name": "28720",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28720"
},
{
"name": "GLSA-200801-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"name": "27582",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27582"
},
{
"name": "[Security-announce] 20080415 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://scary.beasts.org/security/CESA-2007-006.html"
},
{
"name": "GLSA-200801-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"name": "GLSA-200801-18",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"name": "28414",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28414"
},
{
"name": "30106",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30106"
},
{
"name": "28714",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28714"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2006-7228",
"datePublished": "2007-11-14T21:00:00.000Z",
"dateReserved": "2007-11-14T00:00:00.000Z",
"dateUpdated": "2024-08-07T20:57:40.778Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2006-7228",
"date": "2026-05-19",
"epss": "0.02159",
"percentile": "0.84466"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"6.6\", \"matchCriteriaId\": \"03C81A67-7297-4B87-956F-D61E11FEB9F4\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de entero en librer\\u00eda Perl-Compatible Regular Expression (PCRE) anterior a 6.7 podr\\u00eda permitir a atacantes locales o remotos (dependiendo del contexto) ejecutar c\\u00f3digo de su elecci\\u00f3n mediante una expresi\\u00f3n regular que involucra grandes valores (1) min, (2) max, o (3) duplength que provocan un c\\u00e1lculo incorrecto de la longitud y disparan un desbordamiento de b\\u00fafer, una vulnerabilidad diferente de CVE-2006-7227. NOTA: este problema estaba incluido originalmente en CVE-2006-7224, pero ese CVE ha sido rechazado y dividido.\"}]",
"id": "CVE-2006-7228",
"lastModified": "2024-11-21T00:24:41.067",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-11-14T21:46:00.000",
"references": "[{\"url\": \"http://bugs.gentoo.org/show_bug.cgi?id=198976\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2008/000014.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://scary.beasts.org/security/CESA-2007-006.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27582\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/27741\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27773\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27776\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28027\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28041\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28050\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28406\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28414\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28658\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28714\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/28720\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/29032\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/29085\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/29785\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/30106\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/30155\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/30219\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/31124\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200711-30.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200801-02.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200801-18.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200801-19.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200802-10.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200805-11.xml\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1570\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:012\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:030\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_62_pcre.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.pcre.org/changelog.txt\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1059.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1063.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1065.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1068.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1076.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1077.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0546.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/488457/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/490917/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/26462\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0637\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1234/references\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=383371\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://bugs.gentoo.org/show_bug.cgi?id=198976\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2008/000014.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://scary.beasts.org/security/CESA-2007-006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27582\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/27741\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27773\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27776\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28027\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28041\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28050\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28406\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28414\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28658\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28714\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/28720\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/29032\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/29085\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/29785\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/30106\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/30155\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/30219\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31124\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200711-30.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200801-02.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200801-18.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200801-19.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200802-10.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200805-11.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1570\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:012\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:030\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_62_pcre.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.pcre.org/changelog.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1059.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1063.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1065.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1068.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1076.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-1077.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0546.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/488457/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/490917/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/26462\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/0637\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1234/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=383371\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2006-7228\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-11-14T21:46:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de entero en librer\u00eda Perl-Compatible Regular Expression (PCRE) anterior a 6.7 podr\u00eda permitir a atacantes locales o remotos (dependiendo del contexto) ejecutar c\u00f3digo de su elecci\u00f3n mediante una expresi\u00f3n regular que involucra grandes valores (1) min, (2) max, o (3) duplength que provocan un c\u00e1lculo incorrecto de la longitud y disparan un desbordamiento de b\u00fafer, una vulnerabilidad diferente de CVE-2006-7227. NOTA: este problema estaba incluido originalmente en CVE-2006-7224, pero ese CVE ha sido rechazado y dividido.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.6\",\"matchCriteriaId\":\"03C81A67-7297-4B87-956F-D61E11FEB9F4\"}]}]}],\"references\":[{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=198976\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000014.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://scary.beasts.org/security/CESA-2007-006.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27582\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/27741\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27773\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27776\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28027\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28041\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28050\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28406\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28414\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28658\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28714\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/28720\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29032\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29085\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/29785\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30106\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30155\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/30219\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/31124\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-30.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200801-02.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200801-18.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200801-19.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200802-10.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200805-11.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1570\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:012\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:030\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_62_pcre.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.pcre.org/changelog.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1059.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1063.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1065.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1068.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1076.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1077.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0546.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/488457/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/490917/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/26462\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0637\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1234/references\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=383371\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugs.gentoo.org/show_bug.cgi?id=198976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2008/000014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://scary.beasts.org/security/CESA-2007-006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/27741\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27773\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27776\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28050\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28406\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/28720\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30106\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200711-30.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200801-02.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200801-18.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200801-19.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200802-10.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200805-11.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1570\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_62_pcre.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.pcre.org/changelog.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1063.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1065.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1068.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1076.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-1077.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0546.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/488457/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/490917/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/26462\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/0637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1234/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=383371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2007-AVI-513
Vulnerability from certfr_avis - Published: - Updated:None
Description
La bibliothèque PCRE (Perl Compatible Regular Expressions) est un ensemble de fonctions permettant d'utiliser des expressions régulières construites sémantiquement et syntaxiquement de la même manière que les expressions régulières de Perl.
De multiples vulnérabilités ont été découvertes dans la bibliothèque PCRE. L'exploitation de ces vulnérabilités permet à un utilisateur malintentionné d'effectuer diverses actions telles que le déni de service, l'accès à des données sensibles, ou l'exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
PCRE versions antérieures à la version 7.3.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ePCRE versions ant\u00e9rieures \u00e0 la version 7.3.\u003c/p\u003e",
"content": "## Description\n\nLa biblioth\u00e8que PCRE (Perl Compatible Regular Expressions) est un\nensemble de fonctions permettant d\u0027utiliser des expressions r\u00e9guli\u00e8res\nconstruites s\u00e9mantiquement et syntaxiquement de la m\u00eame mani\u00e8re que les\nexpressions r\u00e9guli\u00e8res de Perl.\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans la biblioth\u00e8que\nPCRE. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet \u00e0 un utilisateur\nmalintentionn\u00e9 d\u0027effectuer diverses actions telles que le d\u00e9ni de\nservice, l\u0027acc\u00e8s \u00e0 des donn\u00e9es sensibles, ou l\u0027ex\u00e9cution de code\narbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-1661",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1661"
},
{
"name": "CVE-2006-7230",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7230"
},
{
"name": "CVE-2007-4768",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4768"
},
{
"name": "CVE-2007-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1660"
},
{
"name": "CVE-2007-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1659"
},
{
"name": "CVE-2006-7227",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7227"
},
{
"name": "CVE-2006-7228",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7228"
},
{
"name": "CVE-2007-1662",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1662"
},
{
"name": "CVE-2007-4767",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4767"
},
{
"name": "CVE-2007-4766",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4766"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-547-1 du 27 novembre 2007 :",
"url": "http://www.ubuntulinux.org/usn/usn-547-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1399 du 06 novembre 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1399"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200711-30 du 21 novembre 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200711-30.xml"
}
],
"reference": "CERTA-2007-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-11-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s de la biblioth\u00e8que PCRE",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 d\u0027Ubuntu du 27 novembre 2007",
"url": null
},
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Gentoo du 21 novembre 2007",
"url": null
}
]
}
CERTA-2008-AVI-103
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans VMware ESX Server permettent à une personne malintentionnée d'élever ses privilèges, d'atteindre à la confidentialité des données, d'exécuter du code arbitraire ou de provoquer un déni de service.
Description
Plusieurs vulnérabilités dans VMware ESX Server ont été découvertes :
- une erreur dans le pilote aacraid SCSI permet à un utilisateur local de provoquer un déni de service ou une élévation de privilèges ;
- une vulnérabilité dans Samba permet à une personne malveillante ayant accès à la console de service de provoquer un déni de service ou d'exécuter du code arbitraire à distance ;
- plusieurs vunérabilités dans le module python permettent de provoquer un déni de service, d'exécuter du code arbitraire ou d'atteindre à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de VMware pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans VMware ESX Server ont \u00e9t\u00e9 d\u00e9couvertes :\n\n- une erreur dans le pilote aacraid SCSI permet \u00e0 un utilisateur local\n de provoquer un d\u00e9ni de service ou une \u00e9l\u00e9vation de privil\u00e8ges ;\n- une vuln\u00e9rabilit\u00e9 dans Samba permet \u00e0 une personne malveillante\n ayant acc\u00e8s \u00e0 la console de service de provoquer un d\u00e9ni de service\n ou d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance ;\n- plusieurs vun\u00e9rabilit\u00e9s dans le module python permettent de\n provoquer un d\u00e9ni de service, d\u0027ex\u00e9cuter du code arbitraire ou\n d\u0027atteindre \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de VMware pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-6015",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6015"
},
{
"name": "CVE-2006-7228",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7228"
},
{
"name": "CVE-2007-4308",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4308"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0003 du 04 f\u00e9vrier 2008 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0003.html"
}
],
"reference": "CERTA-2008-AVI-103",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-02-22T00:00:00.000000"
},
{
"description": "correction du lien vers le bulletin de s\u00e9curit\u00e9 VMware.",
"revision_date": "2008-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans VMware ESX Server permettent \u00e0 une\npersonne malintentionn\u00e9e d\u0027\u00e9lever ses privil\u00e8ges, d\u0027atteindre \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, d\u0027ex\u00e9cuter du code arbitraire ou de\nprovoquer un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0003 du 04 f\u00e9vrier 2008",
"url": null
}
]
}
CERTA-2008-AVI-207
Vulnerability from certfr_avis - Published: - Updated:None
Description
Plusieurs vulnérabilités dans VMware Server ESX permettent à un utilisateur distant malintentionné d'exécuter du code arbitraire et de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server ESX 3.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans VMware Server ESX permettent \u00e0 un\nutilisateur distant malintentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire et de\nprovoquer un d\u00e9ni de service.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1660"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2006-7228",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7228"
},
{
"name": "CVE-2008-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0003"
}
],
"links": [],
"reference": "CERTA-2008-AVI-207",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-04-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0007 du 15 avril 2008",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
}
]
}
CERTA-2007-AVI-513
Vulnerability from certfr_avis - Published: - Updated:None
Description
La bibliothèque PCRE (Perl Compatible Regular Expressions) est un ensemble de fonctions permettant d'utiliser des expressions régulières construites sémantiquement et syntaxiquement de la même manière que les expressions régulières de Perl.
De multiples vulnérabilités ont été découvertes dans la bibliothèque PCRE. L'exploitation de ces vulnérabilités permet à un utilisateur malintentionné d'effectuer diverses actions telles que le déni de service, l'accès à des données sensibles, ou l'exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
PCRE versions antérieures à la version 7.3.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ePCRE versions ant\u00e9rieures \u00e0 la version 7.3.\u003c/p\u003e",
"content": "## Description\n\nLa biblioth\u00e8que PCRE (Perl Compatible Regular Expressions) est un\nensemble de fonctions permettant d\u0027utiliser des expressions r\u00e9guli\u00e8res\nconstruites s\u00e9mantiquement et syntaxiquement de la m\u00eame mani\u00e8re que les\nexpressions r\u00e9guli\u00e8res de Perl.\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans la biblioth\u00e8que\nPCRE. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet \u00e0 un utilisateur\nmalintentionn\u00e9 d\u0027effectuer diverses actions telles que le d\u00e9ni de\nservice, l\u0027acc\u00e8s \u00e0 des donn\u00e9es sensibles, ou l\u0027ex\u00e9cution de code\narbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-1661",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1661"
},
{
"name": "CVE-2006-7230",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7230"
},
{
"name": "CVE-2007-4768",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4768"
},
{
"name": "CVE-2007-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1660"
},
{
"name": "CVE-2007-1659",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1659"
},
{
"name": "CVE-2006-7227",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7227"
},
{
"name": "CVE-2006-7228",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7228"
},
{
"name": "CVE-2007-1662",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1662"
},
{
"name": "CVE-2007-4767",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4767"
},
{
"name": "CVE-2007-4766",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4766"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-547-1 du 27 novembre 2007 :",
"url": "http://www.ubuntulinux.org/usn/usn-547-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1399 du 06 novembre 2007 :",
"url": "http://www.debian.org/security/2007/dsa-1399"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200711-30 du 21 novembre 2007 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200711-30.xml"
}
],
"reference": "CERTA-2007-AVI-513",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-11-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s de la biblioth\u00e8que PCRE",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 d\u0027Ubuntu du 27 novembre 2007",
"url": null
},
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Gentoo du 21 novembre 2007",
"url": null
}
]
}
CERTA-2008-AVI-103
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans VMware ESX Server permettent à une personne malintentionnée d'élever ses privilèges, d'atteindre à la confidentialité des données, d'exécuter du code arbitraire ou de provoquer un déni de service.
Description
Plusieurs vulnérabilités dans VMware ESX Server ont été découvertes :
- une erreur dans le pilote aacraid SCSI permet à un utilisateur local de provoquer un déni de service ou une élévation de privilèges ;
- une vulnérabilité dans Samba permet à une personne malveillante ayant accès à la console de service de provoquer un déni de service ou d'exécuter du code arbitraire à distance ;
- plusieurs vunérabilités dans le module python permettent de provoquer un déni de service, d'exécuter du code arbitraire ou d'atteindre à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de VMware pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX Server 2.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 3.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans VMware ESX Server ont \u00e9t\u00e9 d\u00e9couvertes :\n\n- une erreur dans le pilote aacraid SCSI permet \u00e0 un utilisateur local\n de provoquer un d\u00e9ni de service ou une \u00e9l\u00e9vation de privil\u00e8ges ;\n- une vuln\u00e9rabilit\u00e9 dans Samba permet \u00e0 une personne malveillante\n ayant acc\u00e8s \u00e0 la console de service de provoquer un d\u00e9ni de service\n ou d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance ;\n- plusieurs vun\u00e9rabilit\u00e9s dans le module python permettent de\n provoquer un d\u00e9ni de service, d\u0027ex\u00e9cuter du code arbitraire ou\n d\u0027atteindre \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de VMware pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-6015",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6015"
},
{
"name": "CVE-2006-7228",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7228"
},
{
"name": "CVE-2007-4308",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4308"
},
{
"name": "CVE-2007-2052",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
},
{
"name": "CVE-2007-4965",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0003 du 04 f\u00e9vrier 2008 :",
"url": "http://www.vmware.com/security/advisories/VMSA-2008-0003.html"
}
],
"reference": "CERTA-2008-AVI-103",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-02-22T00:00:00.000000"
},
{
"description": "correction du lien vers le bulletin de s\u00e9curit\u00e9 VMware.",
"revision_date": "2008-02-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans VMware ESX Server permettent \u00e0 une\npersonne malintentionn\u00e9e d\u0027\u00e9lever ses privil\u00e8ges, d\u0027atteindre \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, d\u0027ex\u00e9cuter du code arbitraire ou de\nprovoquer un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0003 du 04 f\u00e9vrier 2008",
"url": null
}
]
}
CERTA-2008-AVI-207
Vulnerability from certfr_avis - Published: - Updated:None
Description
Plusieurs vulnérabilités dans VMware Server ESX permettent à un utilisateur distant malintentionné d'exécuter du code arbitraire et de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Server ESX 3.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans VMware Server ESX permettent \u00e0 un\nutilisateur distant malintentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire et de\nprovoquer un d\u00e9ni de service.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-1660",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1660"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2006-7228",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7228"
},
{
"name": "CVE-2008-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0003"
}
],
"links": [],
"reference": "CERTA-2008-AVI-207",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-04-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2008-0007 du 15 avril 2008",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
}
]
}
FKIE_CVE-2006-7228
Vulnerability from fkie_nvd - Published: 2007-11-14 21:46 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03C81A67-7297-4B87-956F-D61E11FEB9F4",
"versionEndIncluding": "6.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split."
},
{
"lang": "es",
"value": "Desbordamiento de entero en librer\u00eda Perl-Compatible Regular Expression (PCRE) anterior a 6.7 podr\u00eda permitir a atacantes locales o remotos (dependiendo del contexto) ejecutar c\u00f3digo de su elecci\u00f3n mediante una expresi\u00f3n regular que involucra grandes valores (1) min, (2) max, o (3) duplength que provocan un c\u00e1lculo incorrecto de la longitud y disparan un desbordamiento de b\u00fafer, una vulnerabilidad diferente de CVE-2006-7227. NOTA: este problema estaba incluido originalmente en CVE-2006-7224, pero ese CVE ha sido rechazado y dividido."
}
],
"id": "CVE-2006-7228",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-11-14T21:46:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
},
{
"source": "secalert@redhat.com",
"url": "http://scary.beasts.org/security/CESA-2007-006.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/27582"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27741"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27773"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27776"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28027"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28041"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28050"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28406"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28414"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28658"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28714"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/28720"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/29032"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/29085"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/29785"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/30106"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/30155"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/30219"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/31124"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200802-10.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.pcre.org/changelog.txt"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1063.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1065.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0546.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/490917/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/26462"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/0637"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2008/1234/references"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://scary.beasts.org/security/CESA-2007-006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/27582"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27741"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27773"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27776"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28041"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28050"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28406"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28714"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/28720"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29085"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/29785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30155"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30219"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200802-10.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.pcre.org/changelog.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1063.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1065.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0546.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/490917/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/26462"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/0637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1234/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-HW27-4FXG-C8F3
Vulnerability from github – Published: 2022-05-01 07:45 – Updated: 2022-05-01 07:45Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
{
"affected": [],
"aliases": [
"CVE-2006-7228"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-11-14T21:46:00Z",
"severity": "MODERATE"
},
"details": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.",
"id": "GHSA-hw27-4fxg-c8f3",
"modified": "2022-05-01T07:45:43Z",
"published": "2022-05-01T07:45:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2007:1059"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2007:1063"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2007:1065"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2007:1068"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2007:1076"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2007:1077"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2008:0546"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2006-7228"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810"
},
{
"type": "WEB",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"type": "WEB",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
},
{
"type": "WEB",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
},
{
"type": "WEB",
"url": "http://scary.beasts.org/security/CESA-2007-006.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27582"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27741"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27773"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27776"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28027"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28041"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28050"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28406"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28414"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28658"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28714"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/28720"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29032"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29085"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/29785"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30106"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30155"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30219"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31124"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200802-10.xml"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"type": "WEB",
"url": "http://www.pcre.org/changelog.txt"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1063.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1065.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0546.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/490917/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/26462"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/0637"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1234/references"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2006-7228
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2006-7228",
"description": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.",
"id": "GSD-2006-7228",
"references": [
"https://www.suse.com/security/cve/CVE-2006-7228.html",
"https://www.debian.org/security/2008/dsa-1570",
"https://access.redhat.com/errata/RHSA-2008:0546",
"https://access.redhat.com/errata/RHSA-2007:1077",
"https://access.redhat.com/errata/RHSA-2007:1076",
"https://access.redhat.com/errata/RHSA-2007:1068",
"https://access.redhat.com/errata/RHSA-2007:1065",
"https://access.redhat.com/errata/RHSA-2007:1063",
"https://access.redhat.com/errata/RHSA-2007:1059",
"https://linux.oracle.com/cve/CVE-2006-7228.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2006-7228"
],
"details": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.",
"id": "GSD-2006-7228",
"modified": "2023-12-13T01:19:53.457954Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-7228",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"name": "http://scary.beasts.org/security/CESA-2007-006.html",
"refsource": "MISC",
"url": "http://scary.beasts.org/security/CESA-2007-006.html"
},
{
"name": "http://secunia.com/advisories/27582",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27582"
},
{
"name": "http://secunia.com/advisories/27773",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27773"
},
{
"name": "http://secunia.com/advisories/28658",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28658"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"name": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html",
"refsource": "MISC",
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"name": "http://www.pcre.org/changelog.txt",
"refsource": "MISC",
"url": "http://www.pcre.org/changelog.txt"
},
{
"name": "http://www.securityfocus.com/bid/26462",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/26462"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=198976",
"refsource": "MISC",
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"name": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html",
"refsource": "MISC",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
},
{
"name": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html",
"refsource": "MISC",
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
},
{
"name": "http://secunia.com/advisories/27741",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27741"
},
{
"name": "http://secunia.com/advisories/27776",
"refsource": "MISC",
"url": "http://secunia.com/advisories/27776"
},
{
"name": "http://secunia.com/advisories/28027",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28027"
},
{
"name": "http://secunia.com/advisories/28041",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28041"
},
{
"name": "http://secunia.com/advisories/28050",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28050"
},
{
"name": "http://secunia.com/advisories/28406",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28406"
},
{
"name": "http://secunia.com/advisories/28414",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28414"
},
{
"name": "http://secunia.com/advisories/28714",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28714"
},
{
"name": "http://secunia.com/advisories/28720",
"refsource": "MISC",
"url": "http://secunia.com/advisories/28720"
},
{
"name": "http://secunia.com/advisories/29032",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29032"
},
{
"name": "http://secunia.com/advisories/29085",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29085"
},
{
"name": "http://secunia.com/advisories/29785",
"refsource": "MISC",
"url": "http://secunia.com/advisories/29785"
},
{
"name": "http://secunia.com/advisories/30106",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30106"
},
{
"name": "http://secunia.com/advisories/30155",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30155"
},
{
"name": "http://secunia.com/advisories/30219",
"refsource": "MISC",
"url": "http://secunia.com/advisories/30219"
},
{
"name": "http://secunia.com/advisories/31124",
"refsource": "MISC",
"url": "http://secunia.com/advisories/31124"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200711-30.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200801-02.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200801-18.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200801-19.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200802-10.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200802-10.xml"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200805-11.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"name": "http://www.debian.org/security/2008/dsa-1570",
"refsource": "MISC",
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-1059.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-1063.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1063.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-1065.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1065.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-1068.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-1076.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2007-1077.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2008-0546.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0546.html"
},
{
"name": "http://www.securityfocus.com/archive/1/488457/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/490917/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/490917/100/0/threaded"
},
{
"name": "http://www.vupen.com/english/advisories/2008/0637",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/0637"
},
{
"name": "http://www.vupen.com/english/advisories/2008/1234/references",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2008/1234/references"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=383371",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.6",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2006-7228"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://scary.beasts.org/security/CESA-2007-006.html",
"refsource": "MISC",
"tags": [],
"url": "http://scary.beasts.org/security/CESA-2007-006.html"
},
{
"name": "http://www.pcre.org/changelog.txt",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.pcre.org/changelog.txt"
},
{
"name": "27582",
"refsource": "SECUNIA",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/27582"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=383371",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"name": "GLSA-200711-30",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200711-30.xml"
},
{
"name": "RHSA-2007:1063",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1063.html"
},
{
"name": "RHSA-2007:1065",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1065.html"
},
{
"name": "RHSA-2007:1059",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1059.html"
},
{
"name": "RHSA-2007:1068",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1068.html"
},
{
"name": "RHSA-2007:1076",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1076.html"
},
{
"name": "RHSA-2007:1077",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-1077.html"
},
{
"name": "SUSE-SA:2007:062",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_62_pcre.html"
},
{
"name": "26462",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/26462"
},
{
"name": "27741",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27741"
},
{
"name": "27773",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27773"
},
{
"name": "27776",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27776"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm"
},
{
"name": "28027",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28027"
},
{
"name": "28050",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28050"
},
{
"name": "28041",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28041"
},
{
"name": "http://bugs.gentoo.org/show_bug.cgi?id=198976",
"refsource": "MISC",
"tags": [],
"url": "http://bugs.gentoo.org/show_bug.cgi?id=198976"
},
{
"name": "GLSA-200801-02",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200801-02.xml"
},
{
"name": "MDVSA-2008:012",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:012"
},
{
"name": "28406",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28406"
},
{
"name": "28414",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28414"
},
{
"name": "GLSA-200801-18",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200801-18.xml"
},
{
"name": "GLSA-200801-19",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200801-19.xml"
},
{
"name": "MDVSA-2008:030",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:030"
},
{
"name": "SUSE-SA:2008:004",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html"
},
{
"name": "28658",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28658"
},
{
"name": "28714",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28714"
},
{
"name": "28720",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/28720"
},
{
"name": "[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
},
{
"name": "GLSA-200802-10",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200802-10.xml"
},
{
"name": "29032",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29032"
},
{
"name": "29085",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29085"
},
{
"name": "[Security-announce] 20080415 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus",
"refsource": "MLIST",
"tags": [],
"url": "http://lists.vmware.com/pipermail/security-announce/2008/000014.html"
},
{
"name": "29785",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/29785"
},
{
"name": "GLSA-200805-11",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200805-11.xml"
},
{
"name": "30155",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30155"
},
{
"name": "30219",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30219"
},
{
"name": "RHSA-2008:0546",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0546.html"
},
{
"name": "31124",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31124"
},
{
"name": "DSA-1570",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1570"
},
{
"name": "30106",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30106"
},
{
"name": "ADV-2008-1234",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1234/references"
},
{
"name": "ADV-2008-0637",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/0637"
},
{
"name": "oval:org.mitre.oval:def:10810",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810"
},
{
"name": "20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/490917/100/0/threaded"
},
{
"name": "20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:17Z",
"publishedDate": "2007-11-14T21:46Z"
}
}
}
RHSA-2007:1059
Vulnerability from csaf_redhat - Published: 2007-11-29 14:50 - Updated: 2025-11-21 17:32Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated pcre packages that resolve several security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "PCRE is a Perl-compatible regular expression library.\n\nFlaws were discovered in the way PCRE handles certain malformed regular\nexpressions. If an application linked against PCRE, such as Konqueror,\nparses a malicious regular expression, it may have been possible to run\narbitrary code as the user running the application.\n(CVE-2006-7225, CVE-2006-7226, CVE-2006-7228, CVE-2006-7230)\n\nUsers of PCRE are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.\n\nRed Hat would like to thank Ludwig Nussel for reporting these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:1059",
"url": "https://access.redhat.com/errata/RHSA-2007:1059"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "383371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"category": "external",
"summary": "384761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=384761"
},
{
"category": "external",
"summary": "384781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=384781"
},
{
"category": "external",
"summary": "384801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=384801"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1059.json"
}
],
"title": "Red Hat Security Advisory: pcre security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:37+00:00",
"generator": {
"date": "2025-11-21T17:32:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:1059",
"initial_release_date": "2007-11-29T14:50:00+00:00",
"revision_history": [
{
"date": "2007-11-29T14:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-11-29T09:51:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"product": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"product_id": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@6.6-2.el5_1.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:6.6-2.el5_1.7.x86_64",
"product": {
"name": "pcre-devel-0:6.6-2.el5_1.7.x86_64",
"product_id": "pcre-devel-0:6.6-2.el5_1.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@6.6-2.el5_1.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.x86_64",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.x86_64",
"product_id": "pcre-0:6.6-2.el5_1.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"product": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"product_id": "pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@6.6-2.el5_1.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:6.6-2.el5_1.7.i386",
"product": {
"name": "pcre-devel-0:6.6-2.el5_1.7.i386",
"product_id": "pcre-devel-0:6.6-2.el5_1.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@6.6-2.el5_1.7?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.i386",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.i386",
"product_id": "pcre-0:6.6-2.el5_1.7.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.src",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.src",
"product_id": "pcre-0:6.6-2.el5_1.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"product": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"product_id": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@6.6-2.el5_1.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.ia64",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.ia64",
"product_id": "pcre-0:6.6-2.el5_1.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:6.6-2.el5_1.7.ia64",
"product": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ia64",
"product_id": "pcre-devel-0:6.6-2.el5_1.7.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@6.6-2.el5_1.7?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"product": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"product_id": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@6.6-2.el5_1.7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.ppc64",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.ppc64",
"product_id": "pcre-0:6.6-2.el5_1.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc64",
"product": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc64",
"product_id": "pcre-devel-0:6.6-2.el5_1.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@6.6-2.el5_1.7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"product": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"product_id": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@6.6-2.el5_1.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.ppc",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.ppc",
"product_id": "pcre-0:6.6-2.el5_1.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc",
"product": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc",
"product_id": "pcre-devel-0:6.6-2.el5_1.7.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@6.6-2.el5_1.7?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"product": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"product_id": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@6.6-2.el5_1.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.s390x",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.s390x",
"product_id": "pcre-0:6.6-2.el5_1.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:6.6-2.el5_1.7.s390x",
"product": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390x",
"product_id": "pcre-devel-0:6.6-2.el5_1.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@6.6-2.el5_1.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"product": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"product_id": "pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-debuginfo@6.6-2.el5_1.7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pcre-0:6.6-2.el5_1.7.s390",
"product": {
"name": "pcre-0:6.6-2.el5_1.7.s390",
"product_id": "pcre-0:6.6-2.el5_1.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre@6.6-2.el5_1.7?arch=s390"
}
}
},
{
"category": "product_version",
"name": "pcre-devel-0:6.6-2.el5_1.7.s390",
"product": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390",
"product_id": "pcre-devel-0:6.6-2.el5_1.7.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcre-devel@6.6-2.el5_1.7?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.src"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.src"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-devel-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-devel-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-devel-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-devel-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-devel-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.src"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-devel-0:6.6-2.el5_1.7.i386"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-devel-0:6.6-2.el5_1.7.ia64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-devel-0:6.6-2.el5_1.7.ppc"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-devel-0:6.6-2.el5_1.7.s390"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-devel-0:6.6-2.el5_1.7.s390x"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcre-devel-0:6.6-2.el5_1.7.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
},
"product_reference": "pcre-devel-0:6.6-2.el5_1.7.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ludwig Nussel"
]
}
],
"cve": "CVE-2006-7225",
"discovery_date": "2007-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "384761"
}
],
"notes": [
{
"category": "description",
"text": "Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a \"malformed POSIX character class\", as demonstrated via an invalid character after a [[ sequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre miscalculation of memory requirements for malformed Posix character class",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-7225"
},
{
"category": "external",
"summary": "RHBZ#384761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=384761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-7225",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7225"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7225",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7225"
}
],
"release_date": "2007-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-11-29T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1059"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pcre miscalculation of memory requirements for malformed Posix character class"
},
{
"acknowledgments": [
{
"names": [
"Ludwig Nussel"
]
}
],
"cve": "CVE-2006-7226",
"discovery_date": "2007-11-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "384781"
}
],
"notes": [
{
"category": "description",
"text": "Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified \"subpattern containing a named recursion or subroutine reference,\" which allows context-dependent attackers to cause a denial of service (error or crash).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-7226"
},
{
"category": "external",
"summary": "RHBZ#384781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=384781"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-7226",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7226"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7226",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7226"
}
],
"release_date": "2007-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-11-29T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1059"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference"
},
{
"cve": "CVE-2006-7228",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2007-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "383371"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre integer overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-7228"
},
{
"category": "external",
"summary": "RHBZ#383371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=383371"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-7228",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7228"
}
],
"release_date": "2007-11-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-11-29T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1059"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pcre integer overflow"
},
{
"acknowledgments": [
{
"names": [
"Ludwig Nussel"
]
}
],
"cve": "CVE-2006-7230",
"discovery_date": "2007-11-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "384801"
}
],
"notes": [
{
"category": "description",
"text": "Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcre miscalculation of memory requirements if options are changed during pattern compilation",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-7230"
},
{
"category": "external",
"summary": "RHBZ#384801",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=384801"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-7230",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7230"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7230",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7230"
}
],
"release_date": "2007-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-11-29T14:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.src",
"5Client-Workstation:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client-Workstation:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-0:6.6-2.el5_1.7.i386",
"5Client:pcre-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-0:6.6-2.el5_1.7.s390",
"5Client:pcre-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-0:6.6-2.el5_1.7.src",
"5Client:pcre-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Client:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Client:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Client:pcre-devel-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-0:6.6-2.el5_1.7.i386",
"5Server:pcre-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-0:6.6-2.el5_1.7.s390",
"5Server:pcre-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-0:6.6-2.el5_1.7.src",
"5Server:pcre-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.i386",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-debuginfo-0:6.6-2.el5_1.7.x86_64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.i386",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ia64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc",
"5Server:pcre-devel-0:6.6-2.el5_1.7.ppc64",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390",
"5Server:pcre-devel-0:6.6-2.el5_1.7.s390x",
"5Server:pcre-devel-0:6.6-2.el5_1.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:1059"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "pcre miscalculation of memory requirements if options are changed during pattern compilation"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.