First published: Sun Jul 28 2019(Updated: )
A flaw was found in libpcre. A buffer overread in JIT mode when \X is used in non-UTF mode may cause application crash and denial of service. The flaw is in function do_extuni_no_utf() in pcre2_jit_compile.c, which uses the macro GETCHARINC to read a character. However, in case there is an invalid UTF character the value read is too big, which causes an out-of-bounds read in the next statement, while executing macro UCD_GRAPHBREAK. References: <a href="https://bugs.exim.org/show_bug.cgi?id=2421">https://bugs.exim.org/show_bug.cgi?id=2421</a> <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=1734468">https://bugzilla.redhat.com/show_bug.cgi?id=1734468</a> Upstream patch: <a href="http://git.php.net/?p=php-src.git;a=commitdiff;h=8947fd9e9fdce87cd6c59817b1db58e789538fe9">http://git.php.net/?p=php-src.git;a=commitdiff;h=8947fd9e9fdce87cd6c59817b1db58e789538fe9</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre2 | <0:10.32-2.el8 | 0:10.32-2.el8 |
Pcre Pcre2 | >=10.31<10.34 | |
Fedoraproject Fedora | =31 | |
redhat/pcre | <10.34 | 10.34 |
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20454 is an out-of-bounds read vulnerability in PCRE that can lead to application crashes.
CVE-2019-20454 affects PCRE versions before 10.34 when the \X pattern is JIT compiled and used to match specially crafted subjects in non-UTF mode.
CVE-2019-20454 has a severity rating of 7.5 (high).
CVE-2019-20454 can be exploited by an attacker using specially crafted subjects to crash applications that use PCRE for parsing untrusted input.
Yes, PCRE version 10.34 or higher includes a fix for CVE-2019-20454.