First published: Fri Feb 03 2017(Updated: )
Integer overflow in the js_regcomp function in regexp.c in Artifex Software, Inc. MuJS before commit b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e allows attackers to cause a denial of service (application crash) via a crafted regular expression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =23 | |
Fedora | =24 | |
Fedora | =25 | |
MuJS | <=2016-10-31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9108 has been classified as a high severity vulnerability due to its potential to cause application crashes.
To fix CVE-2016-9108, update your MuJS versions to a release after October 31, 2016, or apply any available patches.
CVE-2016-9108 affects Fedora versions 23, 24, and 25, as well as MuJS versions up to and including 2016-10-31.
CVE-2016-9108 enables denial of service attacks through crafted regular expressions.
CVE-2016-9108 was identified in the MuJS implementation by Artifex Software, Inc.