CVE-2007-4771

critical

Description

Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.

References

https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00921.html

https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00896.html

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5431

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10507

https://issues.rpath.com/browse/RPL-2199

https://exchange.xforce.ibmcloud.com/vulnerabilities/39936

https://bugzilla.redhat.com/show_bug.cgi?id=429025

http://www.vupen.com/english/advisories/2008/1375/references

http://www.vupen.com/english/advisories/2008/0807/references

http://www.vupen.com/english/advisories/2008/0282

http://www.ubuntu.com/usn/usn-591-1

http://www.securityfocus.com/bid/27455

http://www.securityfocus.com/archive/1/487677/100/0/threaded

http://www.openoffice.org/security/cves/CVE-2007-5745.html

http://www.openoffice.org/security/cves/CVE-2007-4770.html

http://www.novell.com/linux/security/advisories/2008_23_openoffice.html

http://www.debian.org/security/2008/dsa-1511

http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0043

http://sourceforge.net/mailarchive/message.php?msg_name=d03a2ffb0801221538x68825e42xb4a4aaf0fcccecbd%40mail.gmail.com

http://securitytracker.com/id?1019269

http://security.gentoo.org/glsa/glsa-200805-16.xml

http://security.gentoo.org/glsa/glsa-200803-20.xml

http://secunia.com/advisories/30179

http://secunia.com/advisories/29987

http://secunia.com/advisories/29910

http://secunia.com/advisories/29852

http://secunia.com/advisories/29333

http://secunia.com/advisories/29294

http://secunia.com/advisories/29291

http://secunia.com/advisories/29242

http://secunia.com/advisories/29194

http://secunia.com/advisories/28783

http://secunia.com/advisories/28669

http://secunia.com/advisories/28615

http://secunia.com/advisories/28575

http://rhn.redhat.com/errata/RHSA-2008-0090.html

http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html

Details

Source: Mitre, NVD

Published: 2008-01-29

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical