Description
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
Published: 2008-01-09
Score: 4.0 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1460-1 New postgresql-8.1 packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1463-1 New postgresql-7.4 packages fix several vulnerabilities
EUVD EUVD EUVD-2007-4753 The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
Ubuntu USN Ubuntu USN USN-568-1 PostgreSQL vulnerabilities
References
Link Providers
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154 cve-icon cve-icon
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2013-0122.html cve-icon cve-icon
http://secunia.com/advisories/28359 cve-icon cve-icon
http://secunia.com/advisories/28376 cve-icon cve-icon
http://secunia.com/advisories/28437 cve-icon cve-icon
http://secunia.com/advisories/28438 cve-icon cve-icon
http://secunia.com/advisories/28454 cve-icon cve-icon
http://secunia.com/advisories/28455 cve-icon cve-icon
http://secunia.com/advisories/28464 cve-icon cve-icon
http://secunia.com/advisories/28477 cve-icon cve-icon
http://secunia.com/advisories/28479 cve-icon cve-icon
http://secunia.com/advisories/28679 cve-icon cve-icon
http://secunia.com/advisories/28698 cve-icon cve-icon
http://secunia.com/advisories/29070 cve-icon cve-icon
http://secunia.com/advisories/29248 cve-icon cve-icon
http://secunia.com/advisories/29638 cve-icon cve-icon
http://secunia.com/advisories/30535 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200801-15.xml cve-icon cve-icon
http://securitytracker.com/id?1019157 cve-icon cve-icon
http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894 cve-icon cve-icon
http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1460 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1463 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:004 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:059 cve-icon cve-icon
http://www.postgresql.org/about/news.905 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0038.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0040.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0134.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/485864/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/486407/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/493080/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/27163 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2008-0009.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0061 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0109 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1071/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1744 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/39497 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1768 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-4772 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11569 cve-icon cve-icon
https://usn.ubuntu.com/568-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-4772 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html cve-icon cve-icon
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00754}

epss

{'score': 0.0108}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01069}

epss

{'score': 0.00754}


Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Postgresql Postgresql
Redhat Enterprise Linux Rhel Application Stack
Tcl Tcl\/tk
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T15:08:33.913Z

Reserved: 2007-09-10T00:00:00.000Z

Link: CVE-2007-4772

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-01-09T21:46:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-4772

cve-icon Redhat

Severity : Moderate

Publid Date: 2008-01-07T00:00:00Z

Links: CVE-2007-4772 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses