|
Message-Id: <20150626100023.BD5636FC04B@smtpvmsrv1.mitre.org> Date: Fri, 26 Jun 2015 06:00:23 -0400 (EDT) From: cve-assign@...re.org To: wengx522@...il.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength() -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > PCRE library is prone to a vulnerability which leads to Heap Overflow. > During subpattern calculation of a malformed regular expression, an offset > that is used as an array index is fully controlled and can be large enough > so that unexpected heap memory regions are accessed. > One could at least exploit this issue to read objects nearby of the > affected application's memory. > > https://bugs.exim.org/show_bug.cgi?id=1651 >> The important thing was the excess closing parenthesis. >> >> pcre_compile.c >> >> -if (cd->check_lookbehind) >> +if (errorcode == 0 && cd->check_lookbehind) Use CVE-2015-5073. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVjSJuAAoJEKllVAevmvmsJ7MIAJXTns6Oi79pWowcfkwOnJ6y X+gL8MRN9CRnVsKylnzWWg3J+0nRDYBOLGmKAuGTxFsSeb9tNjPlncjfCY01wadk zILaTbxB3nK3cAYV/1z0HXrtDT1bg6ZrP/TMgwViHaoK2n7widOIuZnj0jsk34Qi yn4Hi5pEqTGXujb3+UrzNToqIk+OLZN42jUCfu6RlethtRHDXfNNmTBnV4/I5pOB EADjtAONthLnTmpnu583fYlqFE3ARzp6US3wmp41IIfixZ0QiKCpSqvxQdInhnnE s5pL1u9QbEgnTge/cUqsJ63Nwtic1SOmmFJp7Hqon5335M1SsYqZyRlrbIK71H0= =LnU5 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.