CVE-2005-2491 in PHP
Summary
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
If you want to get best quality of vulnerability data, you may have to visit VulDB.
Reservation
08/08/2005
Disclosure
08/23/2005
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE: