CVE Vulnerabilities

CVE-2017-9229

NULL Pointer Dereference

Published: May 24, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
OnigurumaOniguruma_project6.2.0 (including)6.2.0 (including)
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-php70-php-0:7.0.27-1.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-php70-php-0:7.0.27-1.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-php70-php-0:7.0.27-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-php70-php-0:7.0.27-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-php70-php-0:7.0.27-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUSRedHatrh-php70-php-0:7.0.27-1.el7*
LibonigUbuntuartful*
LibonigUbuntubionic*
LibonigUbuntudevel*
LibonigUbuntuesm-apps/bionic*
LibonigUbuntuesm-apps/xenial*
LibonigUbuntuesm-infra-legacy/trusty*
LibonigUbuntutrusty*
LibonigUbuntutrusty/esm*
LibonigUbuntuxenial*
LibonigUbuntuyakkety*
LibonigUbuntuzesty*
Php5Ubuntuesm-infra-legacy/trusty*
Php5Ubuntutrusty*
Php5Ubuntutrusty/esm*
Php7.0Ubuntuesm-infra/xenial*
Php7.0Ubuntuxenial*
Php7.0Ubuntuzesty*
Php7.1Ubuntuartful*

Potential Mitigations

References