### [CVE-2019-19204](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19204) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read. ### POC #### Reference - https://github.com/ManhNDd/CVE-2019-19204 - https://github.com/kkos/oniguruma/issues/162 - https://github.com/tarantula-team/CVE-2019-19204 #### Github - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon - https://github.com/ManhNDd/CVE-2019-19204 - https://github.com/balabit-deps/balabit-os-8-libonig - https://github.com/balabit-deps/balabit-os-9-libonig - https://github.com/deepin-community/libonig - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/kkos/oniguruma - https://github.com/onivim/esy-oniguruma - https://github.com/tarantula-team/CVE-2019-19204 - https://github.com/winlibs/oniguruma