CVE-2017-9228
Publication date 24 May 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
From the Ubuntu Security Team
It was discovered that Oniguruma incorrectly handled certain regular expressions. An attacker could possibly use this issue to obtain sensitive information, cause a denial of service or execute arbitrary code.
Status
Package | Ubuntu Release | Status |
---|---|---|
libonig | 18.04 LTS bionic |
Fixed 6.3.0-1
|
16.04 LTS xenial |
Fixed 5.9.6-1ubuntu0.1
|
|
14.04 LTS trusty |
Fixed 5.9.1-1ubuntu1.1
|
|
php5 | 18.04 LTS bionic | Not in release |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 5.5.9+dfsg-1ubuntu4.22
|
|
php7.0 | 18.04 LTS bionic | Not in release |
16.04 LTS xenial |
Fixed 7.0.22-0ubuntu0.16.04.1
|
|
14.04 LTS trusty | Not in release | |
php7.1 | 18.04 LTS bionic | Not in release |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Patch details
Package | Patch details |
---|---|
libonig |
|
php5 |
|
php7.0 |
|
php7.1 |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3382-1
- PHP vulnerabilities
- 10 August 2017
- USN-3382-2
- PHP vulnerabilities
- 18 December 2017