cve/2017/CVE-2017-11164.md

37 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-11164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
### POC
#### Reference
- http://openwall.com/lists/oss-security/2017/07/11/3
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/PajakAlexandre/wik-dps-tp02
- https://github.com/adegoodyer/kubernetes-admin-toolkit
- https://github.com/adegoodyer/ubuntu
- https://github.com/andir/nixos-issue-db-example
- https://github.com/brandoncamenisch/release-the-code-litecoin
- https://github.com/cdupuis/image-api
- https://github.com/dispera/giant-squid
- https://github.com/domyrtille/interview_project
- https://github.com/epequeno/devops-demo
- https://github.com/flexiondotorg/CNCF-02
- https://github.com/flyrev/security-scan-ci-presentation
- https://github.com/fokypoky/places-list
- https://github.com/garethr/snykout
- https://github.com/jedipunkz/ecrscan
- https://github.com/nedenwalker/spring-boot-app-using-gradle
- https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln
- https://github.com/onzack/trivy-multiscanner
- https://github.com/tl87/container-scanner
- https://github.com/yeforriak/snyk-to-cve