View | Details | Raw Unified | Return to bug 202209 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+34 lines)
Lines 58-63 Link Here
58
58
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="ff0acfb4-3efa-11e5-93ad-002590263bf5">
62
    <topic>pcre -- heap overflow vulnerability in '(?|' situations</topic>
63
    <affects>
64
      <package>
65
	<name>pcre</name>
66
	<range><le>8.37_2</le></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Venustech ADLAB reports:</p>
72
	<blockquote cite="https://bugs.exim.org/show_bug.cgi?id=1667">
73
	  <p>PCRE library is prone to a vulnerability which leads to Heap
74
	    Overflow. During the compilation of a malformed regular expression,
75
	    more data is written on the malloced block than the expected size
76
	    output by compile_regex. Exploits with advanced Heap Fengshui
77
	    techniques may allow an attacker to execute arbitrary code in the
78
	    context of the user running the affected application.</p>
79
	  <p>Latest version of PCRE is prone to a Heap Overflow vulnerability
80
	    which could caused by the following regular expression.</p>
81
	  <p>/(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/</p>
82
	</blockquote>
83
      </body>
84
    </description>
85
    <references>
86
      <freebsdpr>ports/202209</freebsdpr>
87
      <url>https://bugs.exim.org/show_bug.cgi?id=1667</url>
88
    </references>
89
    <dates>
90
      <discovery>2015-08-05</discovery>
91
      <entry>2015-08-10</entry>
92
    </dates>
93
  </vuln>
94
61
  <vuln vid="8eee06d4-c21d-4f07-a669-455151ff426f">
95
  <vuln vid="8eee06d4-c21d-4f07-a669-455151ff426f">
62
    <topic>mozilla -- multiple vulnerabilities</topic>
96
    <topic>mozilla -- multiple vulnerabilities</topic>
63
    <affects>
97
    <affects>

Return to bug 202209