Impact: Low Public Date: 2019-06-27 CWE: CWE-416 Bugzilla: 1728970: CVE-2019-13224 oniguruma: use-after-free in onig_new_deluxe() in regext.c A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2019-13224 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 3.5 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L |
Attack Vector | Network |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | None |
Availability Impact | Low |
Platform | Package | State |
---|---|---|
Red Hat OpenShift Container Platform 4.1 | oniguruma | Under investigation |
Red Hat Enterprise Linux 8 | oniguruma | Under investigation |
Red Hat Enterprise Linux 6 | oniguruma | Under investigation |