Vulnerability Details : CVE-2017-9225
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression could result in 4 bytes being written off the end of a stack buffer of expand_case_fold_string() during the call to onigenc_unicode_get_case_fold_codes_by_str(), a typical stack buffer overflow.
Vulnerability category: OverflowMemory Corruption
Threat overview for CVE-2017-9225
Top countries where our scanners detected CVE-2017-9225
Top open port discovered on systems with this issue 80
IPs affected by CVE-2017-9225 3,879
Threat actors abusing to this issue? Yes
Find out if you* are affected by CVE-2017-9225!
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-9225
Probability of exploitation activity in the next 30 days: 0.34%
CVSS scores for CVE-2017-9225
|Base Score||Base Severity||CVSS Vector||Exploitability Score||Impact Score||Source|
CWE ids for CVE-2017-9225
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: firstname.lastname@example.org (Primary)
References for CVE-2017-9225
fix #56 : return invalid result for codepoint 0xFFFFFFFF · kkos/oniguruma@166a6c3 · GitHubPatch;Third Party Advisory
Buffer Overflow in onigenc_unicode_get_case_fold_codes_by_str() · Issue #56 · kkos/oniguruma · GitHubExploit;Third Party Advisory
Products affected by CVE-2017-9225