https://bugs.exim.org/show_bug.cgi?id=393
--- Comment #8 from Andrey V. Malyshev <a...@krasn.ru> --- How does this relate to the issue discussed here? (In reply to rapepav820 from comment #7) > (In reply to Pihuram from comment #6) > > https://naturomac.com/ > > The latest version of PCRE (pcre2-10.34-RC1, pcre2-10.33) is prone to a stack > http://www.sprite-ideas.com/ > overflow vulnerability in internal_dfa_match() (pcre2_dfa_match.c) which can > be > triggered using a crafted regular expression. Upon execution of the crafted > regular expression, the function internal_dfa_match() calls itself > recursively, > resulting into uncontrolled recursion. It exceeds the stack size limit (8 > MB), > finally resulting into stack exhaustion. An attacker can potentially exploit > this issue to perform remote code execution or denial of service attack. > > ===================== > Output of ASAN compiled library (-fsanitize=address) > > Run as: ./pcre2test sbovf-input (attached herewith) > http://www.componentanalysis.org/ > > -------------------- > ASAN:DEADLYSIGNAL > > ==17245==ERROR: AddressSanitizer: stack-overflow on address 0x7fffff7feff8 > (pc > 0x5555555afcc7 bp 0x7fffff7ff4b0 sp 0x7fffff7fefe0 T0) > #0 0x5555555afcc6 in internal_dfa_match src/pcre2_dfa_match.c:2859 > #1 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #2 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > http://www.environmentaleducationnews.com/ > #3 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #4 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #5 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #6 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #7 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > http://toscanoandsonsblog.com/ > #8 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #9 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #10 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > ... > <skipped> > ... > #240 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #241 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > http://www.mic-sound.net/ > #242 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #243 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #244 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > http://www.craftpatternwarehouse.com/ > #245 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #246 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #247 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #248 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #249 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > #250 0x5555555b4020 in internal_dfa_match src/pcre2_dfa_match.c:2871 > > > > > > SUMMARY: AddressSanitizer: stack-overflow src/pcre2_dfa_match.c:2859 in > internal_dfa_match http://www.slipstone.co.uk/ > ==17245==ABORTING > > ==================== > With gdb > -------------------- > $ gdb ./pcre2test http://www.bigeasydesarucoast.com/ > > (gdb) r sbovf-input > Program received signal SIGSEGV, Segmentation fault. > 0x00005555555aaab4 in internal_dfa_match (mb=mb@entry=0x7fffffff5800, > this_start_code=this_start_code@entry=0x611000000acf "\210", > current_subject=current_subject@entry=0x629000002eb1 '\200' <repeats 200 > times>..., http://matslideborg.com/ > start_offset=start_offset@entry=6522, offsets=offsets@entry=0x7fffec780030, > offsetcount=offsetcount@entry=1000, https://www.hr-itconsulting.tech/ > > > > http://www.izidil.com/ workspace=0x7fffec781f70, wscount=1000, > rlevel=6522, RWS=0x7fffeb8c5800) at src/pcre2_dfa_match.c:533 > http://padreislandtv.com/ > > > > > The latest version of PCRE (pcre2-10.34-RC1, pcre2-10.33) is prone to a stack > overflow vulnerability http://www.dontfuckwiththeearth.com/ in > internal_dfa_match() > (pcre2_dfa_match.c) which can be triggered using a crafted regular > expression. > Upon execution of the crafted regular expression, the function > internal_dfa_match() http://openbsdvps.net/ calls itself recursively, > resulting into uncontrolled recursion. http://www.artofcharlesgriffith.com/It > exceeds the stack size limit (8 MB), > finally resulting into stack exhaustion. An attacker can potentially exploit > this issue to perform http://www.griintravel.com/ remote code execution or > denial > of service attack. > > SOURCE > http://www.lanavebruja.com/ > http://www.nzhorses.co.nz/ > http://www.heurisko.co.nz/ > http://www.totalregistrations.co/ > https://www.waterspumpingservices.co.nz > http://fb.tiranna.org/ > http://fb.tiranna.org/essences.html > https://www.laikadesign.net/ > http://www.osubg.org/ > http://www.english-for-winners.com/ -- You are receiving this mail because: You are on the CC list for the bug. -- ## List details at https://lists.exim.org/mailman/listinfo/pcre-dev