An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
2019-11-17T18:15:11.440
2024-11-21T04:33:59.490
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | oniguruma_project | oniguruma | ≤ 6.9.3 | Yes |
Application | oniguruma_project | oniguruma | 6.9.4 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | fedoraproject | fedora | 30 | Yes |
Operating System | fedoraproject | fedora | 31 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |