Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-19204

Опубликовано: 21 нояб. 2019
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 7.5

Описание

An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

6.9.4-1
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

released

6.7.0-1ubuntu0.1~esm2
esm-apps/xenial

released

5.9.6-1ubuntu0.1+esm2
esm-infra-legacy/trusty

not-affected

5.9.1-1ubuntu1.1+esm2
esm-infra/focal

not-affected

6.9.4-1
focal

not-affected

6.9.4-1
groovy

not-affected

6.9.4-1

Показывать по

EPSS

Процентиль: 93%
0.11189
Средний

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 5 лет назад

An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.

CVSS3: 7.5
nvd
больше 5 лет назад

An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.

CVSS3: 7.5
debian
больше 5 лет назад

An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the func ...

github
около 3 лет назад

An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость функции fetch_interval_quantifier библиотеки для регулярных выражений Oniguruma, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 93%
0.11189
Средний

5 Medium

CVSS2

7.5 High

CVSS3