First published: Thu Mar 30 2017(Updated: )
A stack-based buffer overflow flaw was found in PCRE. An attacker could use a crafted file that, when processed by PCRE, would crash the application using the PCRE library. This issue only affects the PCRE version 8.40.
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1437367 is critical due to the potential for remote code execution via a stack-based buffer overflow.
To fix REDHAT-BUG-1437367, upgrade to a version of PCRE that is higher than 8.40.
The application affected by REDHAT-BUG-1437367 is any software that uses the PCRE library version 8.40.
Yes, exploitation of REDHAT-BUG-1437367 can lead to a denial of service by crashing the application utilizing the PCRE library.
REDHAT-BUG-1437367 is classified as a stack-based buffer overflow vulnerability.