CVE-2007-4771

Source
https://nvd.nist.gov/vuln/detail/CVE-2007-4771
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2007-4771.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2007-4771
Related
Published
2008-01-29T00:00:00Z
Modified
2024-11-21T00:36:24Z
Downstream
Summary
[none]
Details

Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.

References

Affected packages

Debian:11 / icu

Package

Name
icu
Purl
pkg:deb/debian/icu?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / icu

Package

Name
icu
Purl
pkg:deb/debian/icu?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / icu

Package

Name
icu
Purl
pkg:deb/debian/icu?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}