HIGH
The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.
http://secunia.com/advisories/24918
http://secunia.com/advisories/25394
http://secunia.com/advisories/25544
http://secunia.com/advisories/25578
http://www.amavis.org/security/asa-2007-3.txt
http://www.gentoo.org/security/en/glsa/glsa-200704-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:114
http://www.securityfocus.com/archive/1/469520/30/6420/threaded
http://www.securityfocus.com/bid/24146
http://www.vupen.com/english/advisories/2007/2071
Source: MITRE
Published: 2007-04-13
Updated: 2018-10-16
Type: NVD-CWE-Other
Base Score: 7.8
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact Score: 6.9
Exploitability Score: 10
Severity: HIGH