summaryrefslogtreecommitdiffstats
path: root/data/DTSA/advs
diff options
context:
space:
mode:
authorJoey Hess <joeyh@debian.org>2005-08-29 20:20:17 +0000
committerJoey Hess <joeyh@debian.org>2005-08-29 20:20:17 +0000
commite86bbe9117eb0a7b1947fb86bc0eeca6d73630d7 (patch)
tree2e632324e2a16abe17d0671e3570f23a529d19a8 /data/DTSA/advs
parent5038d37add18c0cf464b59df519155d88ace3250 (diff)
dsta for pcre3
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@1720 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA/advs')
-rw-r--r--data/DTSA/advs/10-pcre.adv14
1 files changed, 14 insertions, 0 deletions
diff --git a/data/DTSA/advs/10-pcre.adv b/data/DTSA/advs/10-pcre.adv
new file mode 100644
index 0000000000..32067cb383
--- /dev/null
+++ b/data/DTSA/advs/10-pcre.adv
@@ -0,0 +1,14 @@
+dtsa: DTSA-10-1
+source: pcre3
+date: August 29th, 2005
+author: Joey Hess
+vuln-type: buffer overflow
+problem-scope: remote
+debian-specific: no
+cve: CAN-2005-2491
+testing-fix: 6.3-0.1etch1
+sid-fix: 6.3-1
+
+An integer overflow in pcre_compile.c in Perl Compatible Regular Expressions
+(PCRE) allows attackers to execute arbitrary code via quantifier values in
+regular expressions, which leads to a heap-based buffer overflow.

© 2014-2024 Faster IT GmbH | imprint | privacy policy