The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugs.ruby-lang.org/issues/13234 | issue tracking vendor advisory |
https://bugs.ruby-lang.org/projects/ruby-trunk/repository/revisions/57660 | issue tracking vendor advisory |
http://www.securityfocus.com/bid/97304 | vdb entry third party advisory |