CVE-2019-20454

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*
cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-02-14 14:15

Updated : 2024-03-27 16:05


NVD link : CVE-2019-20454

Mitre link : CVE-2019-20454

CVE.ORG link : CVE-2019-20454


JSON object : View

Products Affected

fedoraproject

  • fedora

splunk

  • universal_forwarder

pcre

  • pcre2
CWE
CWE-125

Out-of-bounds Read