Уязвимость аварийного завершения работы приложения из-за чтения за границами буфера в PCRE при использовании JIT компиляции
Описание
Обнаружена уязвимость чтения за границами буфера в библиотеке PCRE до версии 10.34. Она возникает при JIT компиляции паттерна \X
и его использовании для сопоставления специально сформированных данных в режиме без UTF. Приложения, которые используют PCRE для обработки недоверенных данных, могут быть уязвимы, позволяя злоумышленнику вызвать аварийное завершение работы приложения. Уязвимость находится в функции do_extuni_no_utf
в файле pcre2_jit_compile.c
.
Затронутые версии ПО
- версии PCRE до 10.34
Тип уязвимости
Чтение за границами буфера
Ссылки
- Issue TrackingPermissions RequiredThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Broken LinkPatch
- Issue TrackingPermissions RequiredThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Broken LinkPatch
Уязвимые конфигурации
Одно из
EPSS
5.1 Medium
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
Связанные уязвимости
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
An out-of-bounds read was discovered in PCRE before 10.34 when the pat ...
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
EPSS
5.1 Medium
CVSS3
7.5 High
CVSS3
5 Medium
CVSS2