CVE-2019-19012

Name
CVE-2019-19012
Description
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
Exploit https://github.com/kkos/oniguruma/issues/164
Exploit https://github.com/tarantula-team/CVE-2019-19012
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
UBUNTU https://usn.ubuntu.com/4460-1/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:* oniguruma >= 6.0.0 <= 6.9.3
cpe:2.3:a:oniguruma_project:oniguruma:6.9.4:rc1:*:*:*:*:*:* oniguruma == None == 6.9.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
oniguruma 3.11-main 6.9.4-r1 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable