Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
References
Link | Resource |
---|---|
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/97067 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201710-25 | |
https://access.redhat.com/errata/RHSA-2018:2486 |
Configurations
Information
Published : 2017-03-23 14:59
Updated : 2018-08-17 03:29
NVD link : CVE-2017-7246
Mitre link : CVE-2017-7246
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
pcre
- pcre