Vulnerability Details : CVE-2005-2491
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
Vulnerability category: OverflowExecute code
Products affected by CVE-2005-2491
- cpe:2.3:a:pcre:pcre:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2491
1.85%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2491
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
Vendor statements for CVE-2005-2491
-
Apache 2008-07-02Fixed in Apache 2.0.55: http://httpd.apache.org/security/vulnerabilities_20.html
References for CVE-2005-2491
-
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
http://www.novell.com/linux/security/advisories/2005_48_pcre.html
404 Page Not Found | SUSE
-
http://www.ethereal.com/appnotes/enpa-sa-00021.html
www.ethereal.com
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1
-
http://www.redhat.com/support/errata/RHSA-2006-0197.html
Support
-
http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1496
404 Not Found
-
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
Apache Mail Archives
-
http://www.debian.org/security/2005/dsa-819
[SECURITY] [DSA 819-1] New python2.1 packages fix arbitrary code execution
-
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E
svn commit: r1073139 [3/13] - in /websites/staging/httpd/trunk/content: ./ security/json/-Apache Mail Archives
-
http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml
Python: Heap overflow in the included PCRE library (GLSA 200509-08) — Gentoo security
-
http://docs.info.apple.com/article.html?artnum=302847
-
http://securityreason.com/securityalert/604
Apache-based Web Server on HP-UX mod_ssl, proxy_http, Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthori - CXSecurity.com
-
http://www.redhat.com/support/errata/RHSA-2005-761.html
Support
-
http://www.securityfocus.com/archive/1/428138/100/0/threaded
-
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
-
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
-
http://www.vupen.com/english/advisories/2005/1511
Site en construction
-
http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml
Apache, mod_ssl: Multiple vulnerabilities (GLSA 200509-12) — Gentoo security
-
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
-
http://www.novell.com/linux/security/advisories/2005_49_php.html
404 Page Not Found | SUSE
-
http://www.vupen.com/english/advisories/2006/4502
Site en construction
-
http://www.vupen.com/english/advisories/2006/0789
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.debian.org/security/2005/dsa-821
[SECURITY] [DSA 821-1] New python2.3 packages fix arbitrary code execution
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
-
http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml
PHP: Vulnerabilities in included PCRE and XML-RPC libraries (GLSA 200509-19) — Gentoo security
-
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E
svn commit: r1075470 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_2
-
http://marc.info/?l=bugtraq&m=112606064317223&w=2
'[OpenPKG-SA-2005.018] OpenPKG Security Advisory (pcre)' - MARC
-
http://www.securityfocus.com/archive/1/427046/100/0/threaded
-
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/-Apache Mail Archives
-
http://www.php.net/release_4_4_1.php
PHP: PHP 4.4.1 Release Announcement
-
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
http://www.vupen.com/english/advisories/2006/4320
Site en construction
-
http://marc.info/?l=bugtraq&m=130497311408250&w=2
'[security bulletin] HPSBOV02683 SSRT090208 rev.1 - HP Secure Web Server (SWS) for OpenVMS running Ap' - MARC
-
http://marc.info/?l=bugtraq&m=112605112027335&w=2
'SUSE Security Announcement: php4, php5 remote code execution' - MARC
-
http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml
libpcre: Heap integer overflow (GLSA 200508-17) — Gentoo security
-
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E
svn commit: r1888194 [3/13] - /httpd/site/trunk/content/security/json/-Apache Mail Archives
-
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/-Apache Mail Archives
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1659
404 Not Found
-
http://www.novell.com/linux/security/advisories/2005_52_apache2.html
404 Page Not Found | SUSE
-
http://www.redhat.com/support/errata/RHSA-2005-358.html
Support
-
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html s
-
http://www.securityfocus.com/bid/14620
-
http://www.debian.org/security/2005/dsa-800
[SECURITY] [DSA 800-1] New pcre3 packages fix arbitrary code execution
-
http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11516
404 Not Found
-
http://www.debian.org/security/2005/dsa-817
[SECURITY] [DSA 817-1] New python2.2 packages fix arbitrary code execution
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A735
404 Not Found
-
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
http://securitytracker.com/id?1014744
Access DeniedPatch
-
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522
-
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/-Apache Mail Archives
-
http://www.vupen.com/english/advisories/2005/2659
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.securityfocus.com/bid/15647
-
http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm
ASA-2006-159 (RHSA-2006-0197)
-
http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml
Gnumeric: Heap overflow in the included PCRE library (GLSA 200509-02) — Gentoo security
Jump to