9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.4%
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in
Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds
write or read occurs in next_state_val() during regular expression
compilation. Octal numbers larger than 0xff are not handled correctly in
fetch_token() and fetch_token_in_cc(). A malformed regular expression
containing an octal number in the form of ‘\700’ would produce an invalid
code point value larger than 0xff in next_state_val(), resulting in an
out-of-bounds write memory corruption.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libonig | < 6.3.0-1 | UNKNOWN |
ubuntu | 14.04 | noarch | libonig | < 5.9.1-1ubuntu1.1 | UNKNOWN |
ubuntu | 16.04 | noarch | libonig | < 5.9.6-1ubuntu0.1 | UNKNOWN |
ubuntu | 14.04 | noarch | php5 | < 5.5.9+dfsg-1ubuntu4.22 | UNKNOWN |
ubuntu | 16.04 | noarch | php7.0 | < 7.0.22-0ubuntu0.16.04.1 | UNKNOWN |
ubuntu | 17.04 | noarch | php7.0 | < 7.0.22-0ubuntu0.17.04.1 | UNKNOWN |
ubuntu | 17.10 | noarch | php7.1 | < 7.1.8-1ubuntu1 | UNKNOWN |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.4%