5
CVE-2008-0172
- EPSS 1.93%
- Published 17.01.2008 23:00:00
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
Data is provided by the National Vulnerability Database (NVD)
Boost ≫ Boost Version1.33
Ubuntu ≫ Ubuntu Linux Version6.06_lts
Ubuntu ≫ Ubuntu Linux Version6.10
Ubuntu ≫ Ubuntu Linux Version7.04
Ubuntu ≫ Ubuntu Linux Version7.10
Ubuntu ≫ Ubuntu Linux Version6.10
Ubuntu ≫ Ubuntu Linux Version7.04
Ubuntu ≫ Ubuntu Linux Version7.10
Boost ≫ Boost Version1.34
Ubuntu ≫ Ubuntu Linux Version6.06_lts
Ubuntu ≫ Ubuntu Linux Version6.10
Ubuntu ≫ Ubuntu Linux Version7.04
Ubuntu ≫ Ubuntu Linux Version7.10
Ubuntu ≫ Ubuntu Linux Version6.10
Ubuntu ≫ Ubuntu Linux Version7.04
Ubuntu ≫ Ubuntu Linux Version7.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.93% | 0.817 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.