An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbcenclen() during regular expression searching. Invalid handling of reg->dmin in forwardsearchrange() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
{ "vanir_signatures": [ { "id": "CVE-2017-9227-87db20c4", "signature_type": "Function", "target": { "file": "src/regexec.c", "function": "forward_search_range" }, "signature_version": "v1", "digest": { "length": 3055.0, "function_hash": "107256506076362528630293821856860722664" }, "deprecated": false, "source": "https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814" }, { "id": "CVE-2017-9227-ce1115bb", "signature_type": "Line", "target": { "file": "src/regexec.c" }, "signature_version": "v1", "digest": { "line_hashes": [ "244917375269462939977115246385469839147", "260813193810532824259245784304712775384", "120231572746728307893137213880243448934", "118234623326047463135166462558158684412" ], "threshold": 0.9 }, "deprecated": false, "source": "https://github.com/kkos/oniguruma/commit/9690d3ab1f9bcd2db8cbe1fe3ee4a5da606b8814" } ] }