[Bug 202209] devel/pcre: Heap Overflow Vulnerability (CVE TBD)
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Mon Aug 10 00:58:48 UTC 2015
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202209
Bug ID: 202209
Summary: devel/pcre: Heap Overflow Vulnerability (CVE TBD)
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Many People
Priority: ---
Component: Individual Port(s)
Assignee: bf at FreeBSD.org
Reporter: jason.unovitch at gmail.com
Assignee: bf at FreeBSD.org
Flags: maintainer-feedback?(bf at FreeBSD.org)
PCRE library is prone to a vulnerability which leads to Heap Overflow.
During the compilation of a malformed regular expression, more data is
written on the malloced block than the expected size output by
compile_regex. Exploits with advanced Heap Fengshui techniques may allow an
attacker to execute arbitrary code in the context of the user running the
affected application.
Latest version of PCRE is prone to a Heap Overflow vulnerability which could
caused by the following regular expression.
/(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/
Reference:
https://bugs.exim.org/show_bug.cgi?id=1667
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list