Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2006-7227

Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.022
EPSS Ranking 83.4%
CVSS Severity
CVSS v2 Score 6.8
References
Products affected by CVE-2006-7227
  • Pcre » Pcre » Version: 1.00
    cpe:2.3:a:pcre:pcre:1.00
  • Pcre » Pcre » Version: 1.01
    cpe:2.3:a:pcre:pcre:1.01
  • Pcre » Pcre » Version: 1.02
    cpe:2.3:a:pcre:pcre:1.02
  • Pcre » Pcre » Version: 1.03
    cpe:2.3:a:pcre:pcre:1.03
  • Pcre » Pcre » Version: 1.04
    cpe:2.3:a:pcre:pcre:1.04
  • Pcre » Pcre » Version: 1.05
    cpe:2.3:a:pcre:pcre:1.05
  • Pcre » Pcre » Version: 1.06
    cpe:2.3:a:pcre:pcre:1.06
  • Pcre » Pcre » Version: 1.07
    cpe:2.3:a:pcre:pcre:1.07
  • Pcre » Pcre » Version: 1.08
    cpe:2.3:a:pcre:pcre:1.08
  • Pcre » Pcre » Version: 1.09
    cpe:2.3:a:pcre:pcre:1.09
  • Pcre » Pcre » Version: 2.00
    cpe:2.3:a:pcre:pcre:2.00
  • Pcre » Pcre » Version: 2.01
    cpe:2.3:a:pcre:pcre:2.01
  • Pcre » Pcre » Version: 2.02
    cpe:2.3:a:pcre:pcre:2.02
  • Pcre » Pcre » Version: 2.03
    cpe:2.3:a:pcre:pcre:2.03
  • Pcre » Pcre » Version: 2.04
    cpe:2.3:a:pcre:pcre:2.04
  • Pcre » Pcre » Version: 2.05
    cpe:2.3:a:pcre:pcre:2.05
  • Pcre » Pcre » Version: 2.06
    cpe:2.3:a:pcre:pcre:2.06
  • Pcre » Pcre » Version: 2.07
    cpe:2.3:a:pcre:pcre:2.07
  • Pcre » Pcre » Version: 2.08
    cpe:2.3:a:pcre:pcre:2.08
  • Pcre » Pcre » Version: 2.08a
    cpe:2.3:a:pcre:pcre:2.08a
  • Pcre » Pcre » Version: 3.0
    cpe:2.3:a:pcre:pcre:3.0
  • Pcre » Pcre » Version: 3.1
    cpe:2.3:a:pcre:pcre:3.1
  • Pcre » Pcre » Version: 3.2
    cpe:2.3:a:pcre:pcre:3.2
  • Pcre » Pcre » Version: 3.3
    cpe:2.3:a:pcre:pcre:3.3
  • Pcre » Pcre » Version: 3.4
    cpe:2.3:a:pcre:pcre:3.4
  • Pcre » Pcre » Version: 3.5
    cpe:2.3:a:pcre:pcre:3.5
  • Pcre » Pcre » Version: 3.6
    cpe:2.3:a:pcre:pcre:3.6
  • Pcre » Pcre » Version: 3.7
    cpe:2.3:a:pcre:pcre:3.7
  • Pcre » Pcre » Version: 3.8
    cpe:2.3:a:pcre:pcre:3.8
  • Pcre » Pcre » Version: 3.9
    cpe:2.3:a:pcre:pcre:3.9
  • Pcre » Pcre » Version: 4.0
    cpe:2.3:a:pcre:pcre:4.0
  • Pcre » Pcre » Version: 4.1
    cpe:2.3:a:pcre:pcre:4.1
  • Pcre » Pcre » Version: 4.2
    cpe:2.3:a:pcre:pcre:4.2
  • Pcre » Pcre » Version: 4.3
    cpe:2.3:a:pcre:pcre:4.3
  • Pcre » Pcre » Version: 4.4
    cpe:2.3:a:pcre:pcre:4.4
  • Pcre » Pcre » Version: 4.5
    cpe:2.3:a:pcre:pcre:4.5
  • Pcre » Pcre » Version: 5.0
    cpe:2.3:a:pcre:pcre:5.0
  • Pcre » Pcre » Version: 6.0
    cpe:2.3:a:pcre:pcre:6.0
  • Pcre » Pcre » Version: 6.1
    cpe:2.3:a:pcre:pcre:6.1
  • Pcre » Pcre » Version: 6.2
    cpe:2.3:a:pcre:pcre:6.2
  • Pcre » Pcre » Version: 6.3
    cpe:2.3:a:pcre:pcre:6.3
  • Pcre » Pcre » Version: 6.4
    cpe:2.3:a:pcre:pcre:6.4
  • Pcre » Pcre » Version: 6.5
    cpe:2.3:a:pcre:pcre:6.5
  • Pcre » Pcre » Version: 6.6
    cpe:2.3:a:pcre:pcre:6.6


Contact Us

Shodan ® - All rights reserved