Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 26 Jun 2015 06:00:23 -0400 (EDT)
From: cve-assign@...re.org
To: wengx522@...il.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: PCRE Library Heap Overflow Vulnerability in find_fixedlength()

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> PCRE library is prone to a vulnerability which leads to Heap Overflow.
> During subpattern calculation of a malformed regular expression, an offset
> that is used as an array index is fully controlled and can be large enough
> so that unexpected heap memory regions are accessed.
> One could at least exploit this issue to read objects nearby of the
> affected application's memory.
> 
> https://bugs.exim.org/show_bug.cgi?id=1651

>> The important thing was the excess closing parenthesis.
>> 
>> pcre_compile.c
>> 
>> -if (cd->check_lookbehind)
>> +if (errorcode == 0 && cd->check_lookbehind)

Use CVE-2015-5073.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVjSJuAAoJEKllVAevmvmsJ7MIAJXTns6Oi79pWowcfkwOnJ6y
X+gL8MRN9CRnVsKylnzWWg3J+0nRDYBOLGmKAuGTxFsSeb9tNjPlncjfCY01wadk
zILaTbxB3nK3cAYV/1z0HXrtDT1bg6ZrP/TMgwViHaoK2n7widOIuZnj0jsk34Qi
yn4Hi5pEqTGXujb3+UrzNToqIk+OLZN42jUCfu6RlethtRHDXfNNmTBnV4/I5pOB
EADjtAONthLnTmpnu583fYlqFE3ARzp6US3wmp41IIfixZ0QiKCpSqvxQdInhnnE
s5pL1u9QbEgnTge/cUqsJ63Nwtic1SOmmFJp7Hqon5335M1SsYqZyRlrbIK71H0=
=LnU5
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.