CVE-2008-0172

The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*
OR cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*
cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*

History

No history.

Information

Published : 2008-01-17 23:00

Updated : 2023-12-10 10:40


NVD link : CVE-2008-0172

Mitre link : CVE-2008-0172

CVE.ORG link : CVE-2008-0172


JSON object : View

Products Affected

ubuntu

  • ubuntu_linux

boost

  • boost
CWE
CWE-20

Improper Input Validation