First published: Thu Mar 30 2017(Updated: )
A stack-based buffer overflow flaw was found in PCRE. An attacker could use a crafted file that, when processed by PCRE, would crash the application using the PCRE library. This issue only affects the PCRE version 8.40.
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1437369 is critical due to the potential for application crashes from a stack-based buffer overflow.
REDHAT-BUG-1437369 affects PCRE by allowing attackers to exploit a crafted file that can crash applications using the PCRE library.
REDHAT-BUG-1437369 specifically affects PCRE version 8.40.
To mitigate the risk of REDHAT-BUG-1437369, upgrade to a patched version of the PCRE library that addresses this buffer overflow vulnerability.
Exploiting REDHAT-BUG-1437369 could lead to application crashes and potential denial of service for systems using the vulnerable PCRE library.