CVE-2005-4872
CVSS4.3
发布时间 :2005-12-31 00:00:00
修订时间 :2010-08-21 00:37:14
NMCOP    

[原文]Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.


[CNNVD]PCRE Regular Expression Library多个整数和缓冲区溢出漏洞(CNNVD-200512-911)

        Perl-Compatible Regular Expression (PCRE) library的6.2之前版本未能正确计算命名捕捉子摸索的数量,语境依赖的攻击者可以通过一个带有大量命名子模式的导致缓冲区溢出的正则表达式,发起拒绝服务(崩溃)攻击。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-119 [内存缓冲区边界内操作的限制不恰当]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11615Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows...
oval:org.mitre.oval:def:21849ELSA-2007:1052: pcre security update (Important)
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4872
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4872
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-911
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/26462
(UNKNOWN)  BID  26462
http://www.redhat.com/support/errata/RHSA-2007-1052.html
(UNKNOWN)  REDHAT  RHSA-2007:1052
http://www.pcre.org/changelog.txt
(UNKNOWN)  CONFIRM  http://www.pcre.org/changelog.txt
http://www.novell.com/linux/security/advisories/2007_62_pcre.html
(UNKNOWN)  SUSE  SUSE-SA:2007:062
http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
(UNKNOWN)  MANDRIVA  MDVSA-2008:030
http://support.avaya.com/elmodocs2/security/ASA-2007-493.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2007-493.htm
http://secunia.com/advisories/28658
(VENDOR_ADVISORY)  SECUNIA  28658
http://secunia.com/advisories/27869
(VENDOR_ADVISORY)  SECUNIA  27869
http://secunia.com/advisories/27773
(VENDOR_ADVISORY)  SECUNIA  27773
http://secunia.com/advisories/27582
(VENDOR_ADVISORY)  SECUNIA  27582
http://scary.beasts.org/security/CESA-2007-006.html
(UNKNOWN)  MISC  http://scary.beasts.org/security/CESA-2007-006.html
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
(UNKNOWN)  SUSE  SUSE-SA:2008:004

- 漏洞信息

PCRE Regular Expression Library多个整数和缓冲区溢出漏洞
中危 缓冲区溢出
2005-12-31 00:00:00 2005-12-31 00:00:00
远程  
        Perl-Compatible Regular Expression (PCRE) library的6.2之前版本未能正确计算命名捕捉子摸索的数量,语境依赖的攻击者可以通过一个带有大量命名子模式的导致缓冲区溢出的正则表达式,发起拒绝服务(崩溃)攻击。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        VMWare ESX Server 3.5
        VMWare ESX350-200803214-UG
        http://download3.vmware.com/software/esx/ESX350-200803214-UG.zip
        PCRE PCRE 3.4
        PCRE pcre-7.4.tar.gz
        ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-7.4.tar.gz
        PCRE PCRE 3.9
        PCRE pcre-7.4.tar.gz
        ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-7.4.tar.gz
        PCRE PCRE 4.4
        PCRE pcre-7.4.tar.gz
        ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-7.4.tar.gz
        PCRE PCRE 5.0
        PCRE pcre-7.4.tar.gz
        ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-7.4.tar.gz
        PCRE PCRE 6.0
        PCRE pcre-7.4.tar.gz
        ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-7.4.tar.gz
        PCRE PCRE 6.1
        PCRE pcre-7.4.tar.gz
        ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-7.4.tar.gz
        PCRE PCRE 6.2
        PCRE pcre-7.4.tar.gz
        ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-7.4.tar.gz

- 漏洞信息 (F63184)

Mandriva Linux Security Advisory 2008-030 (PacketStormID:F63184)
2008-02-01 00:00:00
Mandriva  mandriva.com
advisory,arbitrary,vulnerability
linux,mandriva
CVE-2005-4872,CVE-2006-7225,CVE-2006-7226,CVE-2006-7227,CVE-2006-7228,CVE-2006-7230,CVE-2007-1659
[点击下载]

Mandriva Linux Security Advisory - Multiple vulnerabilities were discovered by Tavis Ormandy and Will Drewry in the way that pcre handled certain malformed regular expressions. If an application linked against pcre, such as Konqueror, parses a malicious regular expression, it could lead to the execution of arbitrary code as the user running the application.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:030
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : pcre
 Date    : January 31, 2008
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 Multiple vulnerabilities were discovered by Tavis Ormandy and
 Will Drewry in the way that pcre handled certain malformed regular
 expressions.  If an application linked against pcre, such as Konqueror,
 parses a malicious regular expression, it could lead to the execution
 of arbitrary code as the user running the application.
 
 Updated packages have been patched to prevent this issue.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4872
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7227
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 6af12132e0e932020ca394cdcf3d3a06  corporate/3.0/i586/libpcre0-4.5-3.4.C30mdk.i586.rpm
 dd9afe15698e99b37f934783762e366d  corporate/3.0/i586/libpcre0-devel-4.5-3.4.C30mdk.i586.rpm
 278b07fa59e68bdc1a50a117c48d1d31  corporate/3.0/i586/pcre-4.5-3.4.C30mdk.i586.rpm 
 c8c3d5ccea445fb8f4d70b71b0ca03df  corporate/3.0/SRPMS/pcre-4.5-3.4.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 a891898c4b21b2088f02ca0f6b769cf0  corporate/3.0/x86_64/lib64pcre0-4.5-3.4.C30mdk.x86_64.rpm
 4119de7999c3dc01965b3a285839262c  corporate/3.0/x86_64/lib64pcre0-devel-4.5-3.4.C30mdk.x86_64.rpm
 060b66751095a700fe6cc121a423a6f1  corporate/3.0/x86_64/pcre-4.5-3.4.C30mdk.x86_64.rpm 
 c8c3d5ccea445fb8f4d70b71b0ca03df  corporate/3.0/SRPMS/pcre-4.5-3.4.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 234f4af314478d52e438785b3350f3d8  mnf/2.0/i586/libpcre0-4.5-3.4.M20mdk.i586.rpm
 0bb7eab034f55e8d7704ef043646ea0a  mnf/2.0/i586/libpcre0-devel-4.5-3.4.M20mdk.i586.rpm
 8056c796cfe2fd4d51e25df9beb075da  mnf/2.0/i586/pcre-4.5-3.4.M20mdk.i586.rpm 
 2d87fce9af8d81c91d86dc81c4fff97b  mnf/2.0/SRPMS/pcre-4.5-3.4.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHomkzmqjQ0CJFipgRAjacAKDAL0SNJp1Q6+mDzeljVZuEVjvgfgCfV3GQ
J636Bfy0MTNt3vNvEtVwXaQ=
=oABM
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息

40753
Perl-Compatible Regular Expression (PCRE) Named Capturing Subpatterns Counting DoS
Denial of Service
Loss of Availability
Vendor Verified

- 漏洞描述

- 时间线

2005-08-01 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 6.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站