Vulnerability Details : CVE-2007-4772
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
Vulnerability category: Denial of service
Threat overview for CVE-2007-4772
Top countries where our scanners detected CVE-2007-4772
Top open port discovered on systems with this issue
5432
IPs affected by CVE-2007-4772 8,692
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-4772!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-4772
Probability of exploitation activity in the next 30 days: 0.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 71 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-4772
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2007-4772
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-4772
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39497
Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2008/0109
Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-0122.html
Third Party Advisory
-
http://www.vmware.com/security/advisories/VMSA-2008-0009.html
VMSA-2008-0009.2Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
Third Party Advisory
-
http://www.securityfocus.com/archive/1/493080/100/0/threaded
Third Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11569
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
[security-announce] SUSE-SU-2016:0555-1: important: Security update forThird Party Advisory
-
http://www.securityfocus.com/archive/1/486407/100/0/threaded
Third Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
[security-announce] openSUSE-SU-2016:0531-1: important: Security updateMailing List;Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2008-0040.html
Third Party Advisory
-
https://issues.rpath.com/browse/RPL-1768
Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
[security-announce] openSUSE-SU-2016:0578-1: important: Security updateMailing List;Third Party Advisory
-
http://www.debian.org/security/2008/dsa-1460
Third Party Advisory
-
http://www.debian.org/security/2008/dsa-1463
Third Party Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPViewThird Party Advisory
-
http://www.vupen.com/english/advisories/2008/1744
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link
-
http://www.redhat.com/support/errata/RHSA-2008-0038.html
Third Party Advisory
-
http://www.securityfocus.com/bid/27163
Patch;Third Party Advisory;VDB Entry
-
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
Broken Link
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
Mailing List;Third Party Advisory
-
http://security.gentoo.org/glsa/glsa-200801-15.xml
Third Party Advisory
-
http://www.postgresql.org/about/news.905
Vendor Advisory
-
http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
Third Party Advisory
-
http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
Exploit;Third Party Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:059
Third Party Advisory
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
Broken Link
-
http://www.vupen.com/english/advisories/2008/0061
Third Party Advisory
-
http://www.vupen.com/english/advisories/2008/1071/references
Third Party Advisory
-
http://www.securityfocus.com/archive/1/485864/100/0/threaded
Third Party Advisory;VDB Entry
-
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
Broken Link
-
http://securitytracker.com/id?1019157
Third Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
[security-announce] SUSE-SU-2016:0539-1: important: Security update forMailing List;Third Party Advisory
-
https://usn.ubuntu.com/568-1/
Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2008-0134.html
Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
[security-announce] SUSE-SU-2016:0677-1: important: Security update forMailing List;Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
Third Party Advisory
Products affected by CVE-2007-4772
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
- cpe:2.3:a:tcl:tcl\/tk:*:*:*:*:*:*:*:*