Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-9226

Опубликовано: 24 мая 2017
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:oniguruma_project:oniguruma:6.2.0:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Версия до 5.6.31 (исключая)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Версия от 7.0.0 (включая) до 7.0.21 (исключая)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Версия от 7.1.0 (включая) до 7.1.7 (исключая)

EPSS

Процентиль: 72%
0.00733
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 4.8
redhat
около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

CVSS3: 9.8
debian
около 8 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod i ...

CVSS3: 9.8
github
около 3 лет назад

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.

fstec
около 8 лет назад

Уязвимость библиотеки Oniguruma, связанная с некорректной обработкой чисел и позволяющая нарушителю вызвать повреждение памяти

EPSS

Процентиль: 72%
0.00733
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-787