CVE-2008-0172

Impact:
Low
Public Date:
2008-01-11
CWE:
CWE-476
Bugzilla:
428320: CVE-2008-0172 boost regular expression NULL dereference flaw

The MITRE CVE dictionary describes this issue as:

The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.

Find out more about CVE-2008-0172 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4 and 6. This issue was addressed in boost packages in Red Hat Enterprise Linux 5 via RHSA-2012:0305.

CVSS v2 metrics

Base Score 2.1
Base Metrics AV:L/AC:L/Au:N/C:N/I:N/A:P
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (boost) RHSA-2012:0305 2012-02-21

Acknowledgements

Red Hat would like to thank Will Drewry for reporting these issues.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.