Unrated severityNVD Advisory· Published Dec 31, 2005· Updated Apr 16, 2026
CVE-2005-4872
CVE-2005-4872
Description
Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- secunia.com/advisories/27582nvdVendor Advisory
- secunia.com/advisories/27773nvdVendor Advisory
- secunia.com/advisories/27869nvdVendor Advisory
- secunia.com/advisories/28658nvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.htmlnvd
- scary.beasts.org/security/CESA-2007-006.htmlnvd
- support.avaya.com/elmodocs2/security/ASA-2007-493.htmnvd
- www.mandriva.com/security/advisoriesnvd
- www.novell.com/linux/security/advisories/2007_62_pcre.htmlnvd
- www.pcre.org/changelog.txtnvd
- www.redhat.com/support/errata/RHSA-2007-1052.htmlnvd
- www.securityfocus.com/bid/26462nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11615nvd
News mentions
0No linked articles in our index yet.