Executive Summary

Informations
Name CVE-2007-4771 First vendor Publication 2008-01-28
Vendor Cve Last vendor Modification 2018-10-15

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4771

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10507
 
Oval ID: oval:org.mitre.oval:def:10507
Title: Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.
Description: Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.
Family: unix Class: vulnerability
Reference(s): CVE-2007-4771
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:17696
 
Oval ID: oval:org.mitre.oval:def:17696
Title: USN-591-1 -- icu vulnerabilities
Description: Will Drewry discovered that libicu did not properly handle '\0' when processing regular expressions.
Family: unix Class: patch
Reference(s): USN-591-1
CVE-2007-4770
CVE-2007-4771
Version: 7
Platform(s): Ubuntu 6.06
Ubuntu 6.10
Ubuntu 7.04
Ubuntu 7.10
Product(s): icu
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18778
 
Oval ID: oval:org.mitre.oval:def:18778
Title: DSA-1511-1 icu - multiple problems
Description: Several local vulnerabilities have been discovered in libicu, International Components for Unicode,
Family: unix Class: patch
Reference(s): DSA-1511-1
CVE-2007-4770
CVE-2007-4771
Version: 7
Platform(s): Debian GNU/Linux 4.0
Product(s): icu
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21714
 
Oval ID: oval:org.mitre.oval:def:21714
Title: ELSA-2008:0090: icu security update (Important)
Description: Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.
Family: unix Class: patch
Reference(s): ELSA-2008:0090-01
CVE-2007-4770
CVE-2007-4771
Version: 13
Platform(s): Oracle Linux 5
Product(s): icu
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:5431
 
Oval ID: oval:org.mitre.oval:def:5431
Title: Multiple Security Vulnerabilities in ICU 3.2 Library Regular Expression Processing May Cause a Denial of Service (DoS)
Description: Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.
Family: unix Class: vulnerability
Reference(s): CVE-2007-4771
Version: 1
Platform(s): Sun Solaris 9
Sun Solaris 10
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8243
 
Oval ID: oval:org.mitre.oval:def:8243
Title: DSA-1511 libicu -- various
Description: Several local vulnerabilities have been discovered in libicu, International Components for Unicode, The Common Vulnerabilities and Exposures project identifies the following problems: libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames. Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.
Family: unix Class: patch
Reference(s): DSA-1511
CVE-2007-4770
CVE-2007-4771
Version: 3
Platform(s): Debian GNU/Linux 4.0
Product(s): libicu
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2009-10-13 Name : SLES10: Security update for icu
File : nvt/sles10_icu0.nasl
2009-06-03 Name : Solaris Update for International Components for Unicode 114677-15
File : nvt/gb_solaris_114677_15.nasl
2009-06-03 Name : Solaris Update for International Components for Unicode 114678-15
File : nvt/gb_solaris_114678_15.nasl
2009-06-03 Name : Solaris Update for International Components for Unicode 119810-05
File : nvt/gb_solaris_119810_05.nasl
2009-06-03 Name : Solaris Update for International Components for Unicode 119811-05
File : nvt/gb_solaris_119811_05.nasl
2009-04-09 Name : Mandriva Update for icu MDVSA-2008:026 (icu)
File : nvt/gb_mandriva_MDVSA_2008_026.nasl
2009-03-23 Name : Ubuntu Update for icu vulnerabilities USN-591-1
File : nvt/gb_ubuntu_USN_591_1.nasl
2009-03-06 Name : RedHat Update for icu RHSA-2008:0090-01
File : nvt/gb_RHSA-2008_0090-01_icu.nasl
2009-02-16 Name : Fedora Update for icu FEDORA-2008-1036
File : nvt/gb_fedora_2008_1036_icu_fc8.nasl
2009-02-16 Name : Fedora Update for icu FEDORA-2008-1076
File : nvt/gb_fedora_2008_1076_icu_fc7.nasl
2009-01-23 Name : SuSE Update for OpenOffice_org SUSE-SA:2008:023
File : nvt/gb_suse_2008_023.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200803-20 (icu)
File : nvt/glsa_200803_20.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200805-16 (openoffice openoffice-bin)
File : nvt/glsa_200805_16.nasl
2008-04-21 Name : Debian Security Advisory DSA 1547-1 (openoffice.org)
File : nvt/deb_1547_1.nasl
2008-03-11 Name : Debian Security Advisory DSA 1511-1 (libicu)
File : nvt/deb_1511_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
41190 International Components for Unicode (ICU) libicu regexcmp.cpp doInterval Fun...

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2008-0090.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20080125_icu_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2008-0090.nasl - Type : ACT_GATHER_INFO
2009-04-23 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2008-026.nasl - Type : ACT_GATHER_INFO
2008-05-16 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200805-16.nasl - Type : ACT_GATHER_INFO
2008-04-22 Name : The remote openSUSE host is missing a security update.
File : suse_OpenOffice_org-5053.nasl - Type : ACT_GATHER_INFO
2008-04-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1547.nasl - Type : ACT_GATHER_INFO
2008-04-17 Name : The remote Windows host has a program that is affected by multiple vulnerabil...
File : openoffice_240.nasl - Type : ACT_GATHER_INFO
2008-03-26 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-591-1.nasl - Type : ACT_GATHER_INFO
2008-03-13 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200803-20.nasl - Type : ACT_GATHER_INFO
2008-03-07 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1511.nasl - Type : ACT_GATHER_INFO
2008-03-07 Name : The remote openSUSE host is missing a security update.
File : suse_icu-5013.nasl - Type : ACT_GATHER_INFO
2008-03-07 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_icu-5014.nasl - Type : ACT_GATHER_INFO
2008-01-27 Name : The remote Fedora host is missing a security update.
File : fedora_2008-1036.nasl - Type : ACT_GATHER_INFO
2008-01-27 Name : The remote Fedora host is missing a security update.
File : fedora_2008-1076.nasl - Type : ACT_GATHER_INFO
2008-01-27 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2008-0090.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/27455
BUGTRAQ http://www.securityfocus.com/archive/1/487677/100/0/threaded
CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0043
http://www.openoffice.org/security/cves/CVE-2007-4770.html
http://www.openoffice.org/security/cves/CVE-2007-5745.html
https://bugzilla.redhat.com/show_bug.cgi?id=429025
https://issues.rpath.com/browse/RPL-2199
DEBIAN http://www.debian.org/security/2008/dsa-1511
FEDORA https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00896...
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00921...
GENTOO http://security.gentoo.org/glsa/glsa-200803-20.xml
http://security.gentoo.org/glsa/glsa-200805-16.xml
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2008:026
MLIST http://sourceforge.net/mailarchive/message.php?msg_name=d03a2ffb0801221538x68...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
REDHAT http://rhn.redhat.com/errata/RHSA-2008-0090.html
SECTRACK http://securitytracker.com/id?1019269
SECUNIA http://secunia.com/advisories/28575
http://secunia.com/advisories/28615
http://secunia.com/advisories/28669
http://secunia.com/advisories/28783
http://secunia.com/advisories/29194
http://secunia.com/advisories/29242
http://secunia.com/advisories/29291
http://secunia.com/advisories/29294
http://secunia.com/advisories/29333
http://secunia.com/advisories/29852
http://secunia.com/advisories/29910
http://secunia.com/advisories/29987
http://secunia.com/advisories/30179
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-231641-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-233922-1
SUSE http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://www.novell.com/linux/security/advisories/2008_23_openoffice.html
UBUNTU http://www.ubuntu.com/usn/usn-591-1
VUPEN http://www.vupen.com/english/advisories/2008/0282
http://www.vupen.com/english/advisories/2008/0807/references
http://www.vupen.com/english/advisories/2008/1375/references
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/39936

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2021-05-05 01:03:59
  • Multiple Updates
2021-04-22 01:06:55
  • Multiple Updates
2020-05-23 01:38:44
  • Multiple Updates
2020-05-23 00:20:25
  • Multiple Updates
2018-10-16 00:19:14
  • Multiple Updates
2018-01-24 21:22:19
  • Multiple Updates
2017-09-29 09:23:12
  • Multiple Updates
2017-07-29 12:02:31
  • Multiple Updates
2016-06-28 23:56:47
  • Multiple Updates
2016-04-26 16:34:39
  • Multiple Updates
2014-02-17 10:41:42
  • Multiple Updates
2013-05-11 10:36:04
  • Multiple Updates