First published: Fri Jan 13 2017(Updated: )
An integer overflow vulnerability was observed in the regemit function in regexp.c in Artifex Software, Inc. MuJS before fa3d30fd18c348bb4b1f3858fb860f4fcd4b2045. The attack requires a regular expression with nested repetition. A successful exploitation of this issue can lead to code execution or a denial of service (buffer overflow) condition.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Artifex MuJS | <2017-01-12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10141 has a high severity rating due to the potential for code execution through integer overflow.
To fix CVE-2016-10141, update to a version of Artifex MuJS released after January 12, 2017.
CVE-2016-10141 is caused by an integer overflow in the regemit function when processing regular expressions with nested repetition.
Yes, CVE-2016-10141 can be exploited remotely if an attacker sends a specially crafted regular expression to the affected software.
All versions of Artifex MuJS prior to the update on January 12, 2017, are affected by CVE-2016-10141.