Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2008-0172

CVE information

Published

14 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*
  No
-
cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*
  Yes
-