CVE-2019-13224 — Use After Free in Project Oniguruma
Severity
9.8CRITICALNVD
EPSS
0.5%
top 32.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 10
Latest updateMay 24
Description
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 8.0, Fedora 29, 30, Ubuntu Linux 12.04, 14.04
Patches
🔴Vulnerability Details
3📋Vendor Advisories
3💬Community
3Bugzilla
▶
Bugzilla
▶