CVE-2017-9226

Public on 2017-05-24
Modified on 2024-04-22
Description
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
Severity
Medium severity
Medium
CVSS v3 Base Score
4.8
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
HAQM Linux 2 - Core oniguruma 2023-10-12 ALAS2-2023-2311 Fixed
HAQM Linux 2023 oniguruma Not Affected
HAQM Linux 2 - Core php 2025-04-09 ALAS2-2025-2832 Fixed
HAQM Linux 1 php56 2017-08-17 ALAS-2017-871 Fixed
HAQM Linux 1 php70 2017-08-03 ALAS-2017-867 Fixed
HAQM Linux 2023 php8.1 Not Affected
HAQM Linux 2023 php8.2 Not Affected
HAQM Linux 2023 ruby3.2 Not Affected

CVSS Scores

Score Type Score Vector
HAQM Linux CVSSv3 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
NVD CVSSv3 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD CVSSv2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P