In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. NOTE: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used
References
Link Resource
http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2018/Dec/33 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/11 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/3 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/7 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/11/01/8 Exploit Mailing List Third Party Advisory
http://www.securityfocus.com/bid/101688 Third Party Advisory VDB Entry
https://bugs.exim.org/show_bug.cgi?id=2047 Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-03-17T16:24:52

Updated: 2024-07-03T17:59:05.695Z

Reserved: 2017-10-30T00:00:00


Link: CVE-2017-16231

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-03-21T15:59:56.217

Modified: 2024-05-17T01:15:34.083


Link: CVE-2017-16231

JSON object: View

cve-icon Redhat Information

No data.

CWE