VYPR
Unrated severityNVD Advisory· Published Nov 15, 2007· Updated Apr 23, 2026

CVE-2006-7230

CVE-2006-7230

Description

Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.

Affected products

1
  • cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*
    Range: <=6.9

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

28

News mentions

0

No linked articles in our index yet.