CVE-2017-9229
oniguruma: Invalid pointer dereference in left_adjust_char_head()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
Se descubrió un problema en Oniguruma versión 6.2.0, como es usado en Oniguruma-mod en Ruby hasta versión 2.4.1 y mbstring en PHP hasta versión 7.1.5. Un SIGSEGV se produce en la función left_adjust_char_head() durante la compilación de expresiones regulares. El manejo no válido de reg-)dmax en forward_search_range() podría resultar en una desreferencia de puntero no válida, normalmente como una condición de denegación de servicio inmediata.
It was discovered that the PHP opcache created keys for files it cached based on their filepath. A local attacker could possibly use this issue in a shared hosting environment to obtain sensitive information. This issue only affected Ubuntu 14.04 LTS. It was discovered that the PHP URL parser incorrectly handled certain URI components. A remote attacker could possibly use this issue to bypass hostname-specific URL checks. This issue only affected Ubuntu 14.04 LTS. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-05-24 CVE Reserved
- 2017-05-24 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-07-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-476: NULL Pointer Dereference
- CWE-787: Out-of-bounds Write
CAPEC
References (5)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/kkos/oniguruma/issues/59 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://github.com/kkos/oniguruma/commit/b690371bbf97794b4a1d3f295d4fb9a8b05d402d | 2022-09-01 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:1296 | 2022-09-01 | |
https://access.redhat.com/security/cve/CVE-2017-9229 | 2018-05-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1466746 | 2018-05-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oniguruma Project Search vendor "Oniguruma Project" | Oniguruma Search vendor "Oniguruma Project" for product "Oniguruma" | 6.2.0 Search vendor "Oniguruma Project" for product "Oniguruma" and version "6.2.0" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | <= 7.1.5 Search vendor "Php" for product "Php" and version " <= 7.1.5" | oniguruma-mod |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | <= 2.4.1 Search vendor "Ruby-lang" for product "Ruby" and version " <= 2.4.1" | oniguruma-mod |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.6.0 < 5.6.31 Search vendor "Php" for product "Php" and version " >= 5.6.0 < 5.6.31" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.0.0 < 7.0.21 Search vendor "Php" for product "Php" and version " >= 7.0.0 < 7.0.21" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.1.0 < 7.1.7 Search vendor "Php" for product "Php" and version " >= 7.1.0 < 7.1.7" | - |
Affected
|