CVE-2015-2305

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rxspencer_project:rxspencer:3.8.g5:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Information

Published : 2015-03-30 10:59

Updated : 2018-10-30 16:27


NVD link : CVE-2015-2305

Mitre link : CVE-2015-2305


JSON object : View

Products Affected

debian

  • debian_linux

opensuse

  • opensuse

rxspencer_project

  • rxspencer
CWE
CWE-189

Numeric Errors