CVE-2017-9226
Published: 24 May 2017
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
From the Ubuntu Security Team
It was discovered that Oniguruma incorrectly handled certain regular expressions. An attacker could possibly use this issue to obtain sensitive information, cause a denial of service or execute arbitrary code.
Priority
Status
Package | Release | Status |
---|---|---|
libonig Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Released
(6.3.0-1)
|
|
trusty |
Released
(5.9.1-1ubuntu1.1)
|
|
upstream |
Needs triage
|
|
xenial |
Released
(5.9.6-1ubuntu0.1)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
Patches: upstream: https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a upstream: https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6 |
||
php5 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.22)
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://github.com/php/php-src/commit/4e68b2c52b1f7bb899295521df15c631a37b3994 |
||
php7.0 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(7.0.22-0ubuntu0.16.04.1)
|
|
zesty |
Released
(7.0.22-0ubuntu0.17.04.1)
|
|
Patches: upstream: https://github.com/php/php-src/commit/1e0c4386ab87c6f6392933450130470cbd1a2b19 |
||
php7.1 Launchpad, Ubuntu, Debian |
artful |
Released
(7.1.8-1ubuntu1)
|
bionic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: https://github.com/php/php-src/commit/1e0c4386ab87c6f6392933450130470cbd1a2b19 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |