First published: Sat Mar 18 2017(Updated: )
An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/erlang | 1:23.2.6+dfsg-1+deb11u1 1:25.2.3+dfsg-1 1:25.3.2.12+dfsg-3 | |
Erlang/OTP | =18.0 | |
Erlang/OTP | =18.0-rc1 | |
Erlang/OTP | =18.0-rc2 | |
Erlang/OTP | =18.0.1 | |
Erlang/OTP | =18.0.2 | |
Erlang/OTP | =18.0.3 | |
Erlang/OTP | =18.1 | |
Erlang/OTP | =18.1.1 | |
Erlang/OTP | =18.1.2 | |
Erlang/OTP | =18.1.3 | |
Erlang/OTP | =18.1.4 | |
Erlang/OTP | =18.1.5 | |
Erlang/OTP | =18.2 | |
Erlang/OTP | =18.2.1 | |
Erlang/OTP | =18.2.2 | |
Erlang/OTP | =18.2.3 | |
Erlang/OTP | =18.2.4 | |
Erlang/OTP | =18.2.4.1 | |
Erlang/OTP | =18.3 | |
Erlang/OTP | =18.3.1 | |
Erlang/OTP | =18.3.2 | |
Erlang/OTP | =18.3.3 | |
Erlang/OTP | =18.3.4 | |
Erlang/OTP | =18.3.4.1 | |
Erlang/OTP | =18.3.4.2 | |
Erlang/OTP | =18.3.4.3 | |
Erlang/OTP | =18.3.4.4 | |
Erlang/OTP | =18.3.4.5 | |
Erlang/OTP | =19.0 | |
Erlang/OTP | =19.0-rc1 | |
Erlang/OTP | =19.0-rc2 | |
Erlang/OTP | =19.0.1 | |
Erlang/OTP | =19.0.2 | |
Erlang/OTP | =19.0.3 | |
Erlang/OTP | =19.0.4 | |
Erlang/OTP | =19.0.5 | |
Erlang/OTP | =19.0.6 | |
Erlang/OTP | =19.0.7 | |
Erlang/OTP | =19.1 | |
Erlang/OTP | =19.1.1 | |
Erlang/OTP | =19.1.2 | |
Erlang/OTP | =19.1.3 | |
Erlang/OTP | =19.1.4 | |
Erlang/OTP | =19.1.5 | |
Erlang/OTP | =19.1.6 | |
Erlang/OTP | =19.1.6.1 | |
Erlang/OTP | =19.2 | |
Erlang/OTP | =19.2.1 | |
Erlang/OTP | =19.2.2 | |
Erlang/OTP | =19.2.3 | |
Erlang/OTP | =19.2.3.1 | |
Erlang/OTP | =19.3 | |
Erlang/OTP | =19.3.1 | |
Erlang/OTP | =19.3.2 | |
Erlang/OTP | =19.3.3 | |
Erlang/OTP | =19.3.4 | |
Erlang/OTP | =19.3.5 | |
Erlang/OTP | =19.3.6 | |
Erlang/OTP | =19.3.6.1 | |
Erlang/OTP | =19.3.6.2 | |
Erlang/OTP | =19.3.6.3 | |
Erlang/OTP | =19.3.6.4 | |
Erlang/OTP | =19.3.6.5 | |
Erlang/OTP | =19.3.6.6 | |
Erlang/OTP | =19.3.6.7 | |
Erlang/OTP | =19.3.6.8 | |
Erlang/OTP | =19.3.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10253 is classified as a high severity vulnerability due to the potential for heap overflow leading to arbitrary code execution.
To fix CVE-2016-10253, update your Erlang/OTP installation to version 19.0 or later.
Erlang/OTP versions prior to 19.0, including 18.x, are affected by CVE-2016-10253.
Yes, CVE-2016-10253 can potentially allow an attacker to execute arbitrary code remotely due to the heap overflow issue.
Yes, CVE-2016-10253 can be exploited when processing malformed regular expressions that come from user input.