Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:30:01.424Z
Reserved: 2005-08-08T00:00:00
Link: CVE-2005-2491

No data.

Status : Modified
Published: 2005-08-23T04:00:00.000
Modified: 2024-11-20T23:59:40.840
Link: CVE-2005-2491
