Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cc9j-57m4-w285

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.

Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.

EPSS

Процентиль: 64%
0.00468
Низкий

Дефекты

CWE-190

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 5 лет назад

Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.

CVSS3: 9.8
nvd
почти 5 лет назад

Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.

CVSS3: 9.8
debian
почти 5 лет назад

Due to incorrect string size calculations inside the preg_quote functi ...

EPSS

Процентиль: 64%
0.00468
Низкий

Дефекты

CWE-190