Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
References
Information
Published : 2015-03-30 10:59
Updated : 2018-10-30 16:27
NVD link : CVE-2015-2305
Mitre link : CVE-2015-2305
JSON object : View
Products Affected
debian
- debian_linux
opensuse
- opensuse
rxspencer_project
- rxspencer
CWE
CWE-189
Numeric Errors
