CVE-2005-2491 in PHPinfo

Summary

Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservation

08/08/2005

Disclosure

08/23/2005

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!