First published: Thu Feb 16 2017(Updated: )
The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <8.41 | 8.41 |
PCRE (Perl Compatible Regular Expressions) | <=8.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6004 is classified as a high severity vulnerability due to its potential for causing denial of service.
To fix CVE-2017-6004, you should upgrade to PCRE versions 8.41 or above.
CVE-2017-6004 enables remote attackers to cause a denial of service through crafted regular expressions.
CVE-2017-6004 affects PCRE versions before 8.41 and versions 8.x before revision 1680.
Exploiting CVE-2017-6004 can lead to out-of-bounds reads and application crashes.