2017-10-16 12:31:07 -04:00
{
2019-03-18 00:04:41 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2005-2491" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 00:04:41 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "OpenPKG-SA-2005.018" ,
"refsource" : "OPENPKG" ,
"url" : "http://marc.info/?l=bugtraq&m=112606064317223&w=2"
} ,
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
} ,
{
"name" : "22691" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/22691"
} ,
{
"name" : "17813" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/17813"
} ,
{
"name" : "ADV-2006-4502" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2006/4502"
} ,
{
"name" : "GLSA-200509-08" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200509-08.xml"
} ,
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm"
} ,
{
"name" : "20060401-01-U" ,
"refsource" : "SGI" ,
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
} ,
{
"name" : "14620" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/14620"
} ,
{
"name" : "ADV-2005-2659" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2005/2659"
} ,
{
"name" : "FLSA:168516" ,
"refsource" : "FEDORA" ,
"url" : "http://www.securityfocus.com/archive/1/427046/100/0/threaded"
} ,
{
"name" : "GLSA-200509-02" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200509-02.xml"
} ,
{
"name" : "TSLSA-2005-0059" ,
"refsource" : "TRUSTIX" ,
"url" : "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
} ,
{
"name" : "22875" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/22875"
} ,
{
"name" : "SSRT061238" ,
"refsource" : "HP" ,
"url" : "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522"
} ,
{
"name" : "SSRT090208" ,
"refsource" : "HP" ,
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
} ,
{
"name" : "HPSBMA02159" ,
"refsource" : "HP" ,
"url" : "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522"
} ,
{
"name" : "oval:org.mitre.oval:def:1659" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1659"
} ,
{
"name" : "http://www.ethereal.com/appnotes/enpa-sa-00021.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.ethereal.com/appnotes/enpa-sa-00021.html"
} ,
{
"name" : "SUSE-SA:2005:051" ,
"refsource" : "SUSE" ,
"url" : "http://marc.info/?l=bugtraq&m=112605112027335&w=2"
} ,
{
"name" : "16502" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/16502"
} ,
{
"name" : "SSRT051251" ,
"refsource" : "HP" ,
"url" : "http://www.securityfocus.com/archive/1/428138/100/0/threaded"
} ,
{
"name" : "21522" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/21522"
} ,
{
"name" : "16679" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/16679"
} ,
{
"name" : "DSA-817" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2005/dsa-817"
} ,
{
"name" : "GLSA-200508-17" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200508-17.xml"
} ,
{
"name" : "ADV-2005-1511" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2005/1511"
} ,
{
"name" : "604" ,
"refsource" : "SREASON" ,
"url" : "http://securityreason.com/securityalert/604"
} ,
{
"name" : "1014744" ,
"refsource" : "SECTRACK" ,
"url" : "http://securitytracker.com/id?1014744"
} ,
{
"name" : "HPSBUX02074" ,
"refsource" : "HP" ,
"url" : "http://www.securityfocus.com/archive/1/428138/100/0/threaded"
} ,
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
} ,
{
"name" : "APPLE-SA-2005-11-29" ,
"refsource" : "APPLE" ,
"url" : "http://docs.info.apple.com/article.html?artnum=302847"
} ,
{
"name" : "RHSA-2005:761" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2005-761.html"
} ,
{
"name" : "SUSE-SA:2005:049" ,
"refsource" : "SUSE" ,
"url" : "http://www.novell.com/linux/security/advisories/2005_49_php.html"
} ,
{
"name" : "DSA-819" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2005/dsa-819"
} ,
{
"name" : "ADV-2006-4320" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2006/4320"
} ,
{
"name" : "RHSA-2005:358" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2005-358.html"
} ,
{
"name" : "oval:org.mitre.oval:def:1496" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1496"
} ,
{
"name" : "DSA-821" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2005/dsa-821"
} ,
{
"name" : "HPSBOV02683" ,
"refsource" : "HP" ,
"url" : "http://marc.info/?l=bugtraq&m=130497311408250&w=2"
} ,
{
"name" : "19072" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19072"
} ,
{
"name" : "19532" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19532"
} ,
{
"name" : "http://www.php.net/release_4_4_1.php" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.php.net/release_4_4_1.php"
} ,
{
"name" : "GLSA-200509-19" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200509-19.xml"
} ,
{
"name" : "oval:org.mitre.oval:def:11516" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11516"
} ,
{
"name" : "17252" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/17252"
} ,
{
"name" : "GLSA-200509-12" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml"
} ,
{
"name" : "SUSE-SA:2005:052" ,
"refsource" : "SUSE" ,
"url" : "http://www.novell.com/linux/security/advisories/2005_52_apache2.html"
} ,
{
"name" : "oval:org.mitre.oval:def:735" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A735"
} ,
{
"name" : "15647" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/15647"
} ,
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-159.htm"
} ,
{
"name" : "DSA-800" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2005/dsa-800"
} ,
{
"name" : "19193" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19193"
} ,
{
"name" : "SCOSA-2006.10" ,
"refsource" : "SCO" ,
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
} ,
{
"name" : "102198" ,
"refsource" : "SUNALERT" ,
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1"
} ,
{
"name" : "SUSE-SA:2005:048" ,
"refsource" : "SUSE" ,
"url" : "http://www.novell.com/linux/security/advisories/2005_48_pcre.html"
} ,
{
"name" : "RHSA-2006:0197" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0197.html"
} ,
{
"name" : "ADV-2006-0789" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2006/0789"
}
]
}
}