Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAOSkqBVzdK-qB-hWiQz+od4M1h5=HskE-MGfYx6CyiiXYZv-6g@mail.gmail.com>
Date: Mon, 24 Aug 2015 09:36:52 +0800
From: Guanxing Wen <wengx522@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE Request: PCRE Library Heap Overflow in compile_regex()

Hi, MITRE

PCRE library is prone to a vulnerability which leads to Heap Overflow.
During the compilation of a malformed regular expression, more data is
written on the malloced block than the expected size output by
compile_regex().
The Heap Overflow vulnerability is caused by the following regular
expression.

/(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/

A dry run of this particular regular expression with pcretest will reports
"double free or corruption (!prev)".
But it is actually a heap overflow problem.
The overflow only affects pcre 8.x branch, pcre2 branch is not affected.

This is a different issue from
http://www.openwall.com/lists/oss-security/2015/08/05/3

Reference:
https://bugs.exim.org/show_bug.cgi?id=1672

Please allocate a CVE-ID for this.

Thanks.

Wen Guanxing from Venustech ADLAB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.