CVE-2016-10253Improper Restriction of Operations within the Bounds of a Memory Buffer in OTP

Severity
9.8CRITICALNVD
OSV7.5
EPSS
0.5%
top 33.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 18
Latest updateMay 14

Description

An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Debianerlang/erlang_otp< 1:19.2.1+dfsg-2+3
Ubuntuerlang/erlang_otp< 1:16.b.3-dfsg-1ubuntu2.2+1
NVDerlang/erlang_otp63 versions+62

🔴Vulnerability Details

4
GHSA
GHSA-9cqh-gh33-j3r9: An issue was discovered in Erlang/OTP 182022-05-14
OSV
erlang vulnerabilities2018-02-14
OSV
CVE-2016-10253: An issue was discovered in Erlang/OTP 182017-03-18
CVEList
CVE-2016-10253: An issue was discovered in Erlang/OTP 182017-03-18

📋Vendor Advisories

3
Ubuntu
Erlang vulnerabilities2018-02-14
Red Hat
erlang: Heap-buffer overflow via regular expressions2016-06-19
Debian
CVE-2016-10253: erlang - An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regu...2016

💬Community

4
Bugzilla
CVE-2016-10253 erlang: Heap-buffer overflow via regular expressions [epel-6]2017-03-20
Bugzilla
CVE-2016-10253 erlang: Heap-buffer overflow via regular expressions [epel-7]2017-03-20
Bugzilla
CVE-2016-10253 erlang: Heap-buffer overflow via regular expressions2017-03-20
Bugzilla
CVE-2016-10253 erlang: Heap-buffer overflow via regular expressions [fedora-all]2017-03-20
CVE-2016-10253 — Erlang OTP vulnerability | cvebase