[pcre-dev] [Bug 2057] New: another stack-based buffer overfl…

Top Page
Delete this message
Author: admin
Date:  
To: pcre-dev
Subject: [pcre-dev] [Bug 2057] New: another stack-based buffer overflow in pcre32_copy_substring (pcre_get.c)
https://bugs.exim.org/show_bug.cgi?id=2057

            Bug ID: 2057
           Summary: another stack-based buffer overflow in
                    pcre32_copy_substring (pcre_get.c)
           Product: PCRE
           Version: 8.40
          Hardware: x86-64
                OS: Linux
            Status: NEW
          Severity: bug
          Priority: medium
         Component: Code
          Assignee: ph10@???
          Reporter: ago@???
                CC: pcre-dev@???


Created attachment 998
--> https://bugs.exim.org/attachment.cgi?id=998&action=edit
stacktrace

Hello,

I found a stack overflow write through fuzzing.

The bug seems similar to bug 2055, but the size of the write changes.
It was tested on version 8.40, compiled with clang-3.9.1


Output, included stacktrace in attachment.

Command to reproduce:
# pcretest -32 -d $FILE

Reproducer:
https://github.com/asarubbo/poc/blob/master/00209-pcre-stackoverflow2-read_capture_name32

( I know that is preferable attach reproducer here, but this link won't expire
in the future )

--
You are receiving this mail because:
You are on the CC list for the bug.