CVE-2017-6181

The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.
References
Link Resource
http://www.securityfocus.com/bid/97304 Third Party Advisory VDB Entry
https://bugs.ruby-lang.org/issues/13234 Issue Tracking Vendor Advisory
https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/57660 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ruby-lang:ruby:2.4.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-04-03 05:59

Updated : 2024-02-04 19:11


NVD link : CVE-2017-6181

Mitre link : CVE-2017-6181

CVE.ORG link : CVE-2017-6181


JSON object : View

Products Affected

ruby-lang

  • ruby
CWE
CWE-20

Improper Input Validation