Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-20454

Опубликовано: 14 фев. 2020
Источник: ubuntu
Приоритет: low
CVSS2: 5
CVSS3: 7.5

Описание

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

10.34-7
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

10.34-7
focal

not-affected

10.34-7
groovy

not-affected

10.34-7
hirsute

not-affected

10.34-7

Показывать по

Ссылки на источники

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 6 лет назад

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

CVSS3: 7.5
nvd
больше 5 лет назад

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

CVSS3: 7.5
debian
больше 5 лет назад

An out-of-bounds read was discovered in PCRE before 10.34 when the pat ...

rocky
больше 4 лет назад

Moderate: pcre2 security and enhancement update

CVSS3: 7.5
github
около 3 лет назад

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.

5 Medium

CVSS2

7.5 High

CVSS3