Integer overflow in the js_regcomp function in regexp.c in Artifex Software, Inc. MuJS before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e allows attackers to cause a denial of service (application crash) via a crafted regular expression.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4FE2LXVJM5PXHUGSFOT2KTA75O5ACV4/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WMI77FMFDWOTUUKKPTQLIB7JEXFTING4/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IMPCTUBV2UUTSKAGVAW3EL6HJJWHRZQZ/ | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1390266 | Issue Tracking Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/10/30/12 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/96006 | Third Party Advisory VDB Entry |
Information
Published : 2017-02-03 07:59
Updated : 2020-04-22 06:00
NVD link : CVE-2016-9108
Mitre link : CVE-2016-9108
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
artifex
- mujs
fedoraproject
- fedora