Resource Management Errors Affecting icu package, versions <3.8-6


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.66% (88th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-ICU-337413
  • published29 Jan 2008
  • disclosed29 Jan 2008

Introduced: 29 Jan 2008

CVE-2007-4771  (opens in a new tab)
CWE-399  (opens in a new tab)

How to fix?

Upgrade Debian:8 icu to version 3.8-6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream icu package and not the icu package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack. NOTE: some of these details are obtained from third party information.

References

CVSS Scores

version 3.1