7.8
CVSSv3

CVE-2020-11958

Published: 21/04/2020 Updated: 27/01/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

re2c 1.3 has a heap-based buffer overflow in Scanner::fill in parse/scanner.cc via a long lexeme.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

re2c re2c 1.3

canonical ubuntu linux 19.10

canonical ubuntu linux 20.04

Vendor Advisories

Debian Bug report logs - #963158 re2c: CVE-2020-11958 Package: src:re2c; Maintainer for src:re2c is JCF Ploemen (jcfp) <linux@jcfpm>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 19 Jun 2020 18:03:04 UTC Severity: important Tags: security, upstream Found in version re2c/13-1 Reply or subsc ...
re2c could be made to execute arbitrary code if it received a specially crafted file ...
re2c could be made to execute arbitrary code if it received a specially crafted file ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: re2c: heap overflow in Scanner::fill (scannercc) <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Henri Salo ...