Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2015-03-30 03:59
Updated : 2022-08-16 06:29
NVD link : CVE-2015-2305
Mitre link : CVE-2015-2305
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
canonical
- ubuntu_linux
rxspencer_project
- rxspencer
php
- php
debian
- debian_linux
opensuse
- opensuse