pcre2test.c in PCRE2 10.23 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression.
References
Link | Resource |
---|---|
https://blogs.gentoo.org/ago/2017/04/29/libpcre-heap-based-buffer-overflow-write-in-pcre2test-c/ | Exploit Patch Third Party Advisory VDB Entry |
https://bugs.exim.org/show_bug.cgi?id=2079 | Exploit Issue Tracking Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201710-09 | |
https://vcs.pcre.org/pcre2?view=revision&revision=696 | Patch Vendor Advisory |
https://vcs.pcre.org/pcre2?view=revision&revision=697 | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-05-05 00:29
Updated : 2024-02-04 19:11
NVD link : CVE-2017-8786
Mitre link : CVE-2017-8786
CVE.ORG link : CVE-2017-8786
JSON object : View
Products Affected
pcre
- pcre2
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer