pcre -- heap overflow vulnerability in '(?|' situations
Venustech ADLAB reports:
PCRE library is prone to a vulnerability which leads to Heap
Overflow. During the compilation of a malformed regular expression,
more data is written on the malloced block than the expected size
output by compile_regex. Exploits with advanced Heap Fengshui
techniques may allow an attacker to execute arbitrary code in the
context of the user running the affected application.
Latest version of PCRE is prone to a Heap Overflow vulnerability
which could caused by the following regular expression.
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright