Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97067 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:2486 | |
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201710-25 |
Configurations
History
No history.
Information
Published : 2017-03-23 21:59
Updated : 2024-02-28 15:44
NVD link : CVE-2017-7245
Mitre link : CVE-2017-7245
CVE.ORG link : CVE-2017-7245
JSON object : View
Products Affected
pcre
- pcre
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer