First published: Mon Mar 30 2015(Updated: )
Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rxspencer project rxspencer | =3.8.g5 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
Debian | =7.0 | |
Debian | =8.0 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
PHP | >=5.4.0<5.4.39 | |
PHP | >=5.5.0<5.5.23 | |
PHP | >=5.6.0<5.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2305 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2015-2305, you should update the affected software to a version that eliminates the integer overflow issue.
CVE-2015-2305 affects several systems including certain versions of Ubuntu, Debian, openSUSE, and the rxspencer regex library.
CVE-2015-2305 enables context-dependent attackers to execute arbitrary code through a crafted large regular expression.
Yes, CVE-2015-2305 primarily affects 32-bit platforms due to an integer overflow in the regex implementation.