Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-10253

Опубликовано: 18 мар. 2017
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:erlang:erlang\/otp:18.0:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.0:rc1:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.0:rc2:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.0.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.0.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.0.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.1.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.1.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.1.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.1.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.1.5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.2.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.2.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.2.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.2.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:18.3.4.5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0:rc1:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0:rc2:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0.5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0.6:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.0.7:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1.5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1.6:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.2.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.2.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.2.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.2:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.3:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.4:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.5:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.6:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.7:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.8:*:*:*:*:*:*:*
cpe:2.3:a:erlang:erlang\/otp:19.3.6.9:*:*:*:*:*:*:*

EPSS

Процентиль: 66%
0.00513
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.

CVSS3: 4.4
redhat
больше 9 лет назад

An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.

CVSS3: 9.8
debian
почти 9 лет назад

An issue was discovered in Erlang/OTP 18.x. Erlang's generation of com ...

CVSS3: 9.8
github
больше 3 лет назад

An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.

EPSS

Процентиль: 66%
0.00513
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119