CVE-2014-7926
Severity CVSS v4.0:
Pending analysis
Type:
CWE-17
Code Errors
Publication date:
22/01/2015
Last modified:
12/04/2025
Description
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | 40.0.2214.85 (including) | |
cpe:2.3:o:oracle:communications_messaging_server:7.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:oracle:communications_messaging_server:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\/c\+\+:*:* | 55.1 (excluding) | |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://bugs.icu-project.org/trac/ticket/11369
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://secunia.com/advisories/62383
- http://secunia.com/advisories/62575
- http://secunia.com/advisories/62665
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/72288
- http://www.securitytracker.com/id/1031623
- http://www.ubuntu.com/usn/USN-2476-1
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- https://code.google.com/p/chromium/issues/detail?id=422824
- https://codereview.chromium.org/726973003
- https://security.gentoo.org/glsa/201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://bugs.icu-project.org/trac/ticket/11369
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://secunia.com/advisories/62383
- http://secunia.com/advisories/62575
- http://secunia.com/advisories/62665
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/72288
- http://www.securitytracker.com/id/1031623
- http://www.ubuntu.com/usn/USN-2476-1
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- https://code.google.com/p/chromium/issues/detail?id=422824
- https://codereview.chromium.org/726973003
- https://security.gentoo.org/glsa/201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html