Unrated severityNVD Advisory· Published Jan 29, 2008· Updated Apr 23, 2026
CVE-2007-4771
CVE-2007-4771
Description
Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.
Affected products
1- cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\/c\+\+:*:*Range: <=3.8.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
40- www.securityfocus.com/bid/27455nvdPatchThird Party AdvisoryVDB Entry
- lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2008-0090.htmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200803-20.xmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-200805-16.xmlnvdThird Party Advisory
- securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- sourceforge.net/mailarchive/message.phpnvdThird Party Advisory
- wiki.rpath.com/wiki/Advisories:rPSA-2008-0043nvdThird Party Advisory
- www.debian.org/security/2008/dsa-1511nvdThird Party Advisory
- www.novell.com/linux/security/advisories/2008_23_openoffice.htmlnvdThird Party Advisory
- www.openoffice.org/security/cves/CVE-2007-4770.htmlnvdThird Party Advisory
- www.openoffice.org/security/cves/CVE-2007-5745.htmlnvdThird Party Advisory
- www.ubuntu.com/usn/usn-591-1nvdThird Party Advisory
- www.vupen.com/english/advisories/2008/0282nvdThird Party Advisory
- www.vupen.com/english/advisories/2008/0807/referencesnvdThird Party Advisory
- www.vupen.com/english/advisories/2008/1375/referencesnvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/39936nvdThird Party AdvisoryVDB Entry
- issues.rpath.com/browse/RPL-2199nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10507nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5431nvdThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2008-January/msg00896.htmlnvdThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2008-January/msg00921.htmlnvdThird Party Advisory
- secunia.com/advisories/28575nvdPermissions Required
- secunia.com/advisories/28615nvdPermissions Required
- secunia.com/advisories/28669nvdPermissions Required
- secunia.com/advisories/28783nvdPermissions Required
- secunia.com/advisories/29194nvdPermissions Required
- secunia.com/advisories/29242nvdPermissions Required
- secunia.com/advisories/29291nvdPermissions Required
- secunia.com/advisories/29294nvdPermissions Required
- secunia.com/advisories/29333nvdPermissions Required
- secunia.com/advisories/29852nvdPermissions Required
- secunia.com/advisories/29910nvdPermissions Required
- secunia.com/advisories/29987nvdPermissions Required
- secunia.com/advisories/30179nvdPermissions Required
- sunsolve.sun.com/search/document.donvdBroken Link
- sunsolve.sun.com/search/document.donvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.securityfocus.com/archive/1/487677/100/0/threadednvd
News mentions
0No linked articles in our index yet.