|
Lines 58-63
Link Here
|
| 58 |
|
58 |
|
| 59 |
--> |
59 |
--> |
| 60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
61 |
<vuln vid="ff0acfb4-3efa-11e5-93ad-002590263bf5"> |
| 62 |
<topic>pcre -- heap overflow vulnerability in '(?|' situations</topic> |
| 63 |
<affects> |
| 64 |
<package> |
| 65 |
<name>pcre</name> |
| 66 |
<range><le>8.37_2</le></range> |
| 67 |
</package> |
| 68 |
</affects> |
| 69 |
<description> |
| 70 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
| 71 |
<p>Venustech ADLAB reports:</p> |
| 72 |
<blockquote cite="https://bugs.exim.org/show_bug.cgi?id=1667"> |
| 73 |
<p>PCRE library is prone to a vulnerability which leads to Heap |
| 74 |
Overflow. During the compilation of a malformed regular expression, |
| 75 |
more data is written on the malloced block than the expected size |
| 76 |
output by compile_regex. Exploits with advanced Heap Fengshui |
| 77 |
techniques may allow an attacker to execute arbitrary code in the |
| 78 |
context of the user running the affected application.</p> |
| 79 |
<p>Latest version of PCRE is prone to a Heap Overflow vulnerability |
| 80 |
which could caused by the following regular expression.</p> |
| 81 |
<p>/(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/</p> |
| 82 |
</blockquote> |
| 83 |
</body> |
| 84 |
</description> |
| 85 |
<references> |
| 86 |
<freebsdpr>ports/202209</freebsdpr> |
| 87 |
<url>https://bugs.exim.org/show_bug.cgi?id=1667</url> |
| 88 |
</references> |
| 89 |
<dates> |
| 90 |
<discovery>2015-08-05</discovery> |
| 91 |
<entry>2015-08-10</entry> |
| 92 |
</dates> |
| 93 |
</vuln> |
| 94 |
|
| 61 |
<vuln vid="8eee06d4-c21d-4f07-a669-455151ff426f"> |
95 |
<vuln vid="8eee06d4-c21d-4f07-a669-455151ff426f"> |
| 62 |
<topic>mozilla -- multiple vulnerabilities</topic> |
96 |
<topic>mozilla -- multiple vulnerabilities</topic> |
| 63 |
<affects> |
97 |
<affects> |