Описание
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Directory Server 8 | pcre | Not affected | ||
Red Hat Enterprise Linux 5 | pcre | Not affected | ||
Red Hat Enterprise Linux 6 | glib2 | Will not fix | ||
Red Hat Enterprise Linux 6 | pcre | Not affected | ||
Red Hat Enterprise Linux 7 | glib2 | Will not fix | ||
Red Hat Enterprise Linux 7 | virtuoso-opensource | Not affected | ||
Red Hat JBoss Enterprise Web Server 1 | httpd | Not affected | ||
Red Hat JBoss Enterprise Web Server 2 | httpd | Not affected | ||
Red Hat JBoss Enterprise Web Server 3 | pcre | Will not fix | ||
Red Hat Software Collections | php54-php | Will not fix |
Показывать по
Дополнительная информация
Статус:
4.3 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
Heap-based buffer overflow in the find_fixedlength function in pcre_co ...
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
4.3 Medium
CVSS2