{"id":"CVE-2017-9224","details":"An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.","modified":"2026-04-16T01:40:58.671182627Z","published":"2017-05-24T15:29:00.183Z","related":["SUSE-SU-2017:1585-1","SUSE-SU-2017:1662-1","SUSE-SU-2017:1717-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/101244"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1296"},{"type":"ADVISORY","url":"https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b"},{"type":"ADVISORY","url":"https://github.com/kkos/oniguruma/issues/57"},{"type":"REPORT","url":"https://github.com/kkos/oniguruma/issues/57"},{"type":"FIX","url":"https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b"},{"type":"EVIDENCE","url":"https://github.com/kkos/oniguruma/issues/57"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/kkos/oniguruma","events":[{"introduced":"0"},{"fixed":"690313a061f7a4fa614ec5cc8368b4f2284e059b"}]}],"versions":["v5.9.6","v6.0.0","v6.1.0","v6.1.1","v6.1.2","v6.1.3"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","target":{"file":"src/regexec.c"},"id":"CVE-2017-9224-4e7c3a81","deprecated":false,"signature_type":"Line","source":"https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b","digest":{"threshold":0.9,"line_hashes":["218275574838915329428894979863676023579","110376745905432703800914764257437607206","320066072742789064155736675079030765698","136023353432955758296444224254897665712","283348006629708797105129985095973840520","263955851575144037512564373773188411580","101836692004798677941713213678481189101","93792859032957038648003350962208405452","276724385951229306965048612161485230063","77619366922882625014828695891397227529","95649270530021035589215734886776241323"]}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-9224.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"0221e9f827632942225586687a33cfd554860d5e"},{"fixed":"73915a2bd61f21fd809b4d50af9aba950f43e807"},{"introduced":"60fffd296abce5fc071f3c173c25a2696cf683c6"},{"fixed":"8a79ce6c8b9d309573993ce332f3951ea1947e2f"}]}],"database_specific":{"vanir_signatures":[{"signature_version":"v1","target":{"function":"compile_bracket_matchingpath","file":"ext/pcre/pcrelib/pcre_jit_compile.c"},"id":"CVE-2017-9224-343f4c1a","deprecated":false,"source":"https://github.com/php/php-src/commit/73915a2bd61f21fd809b4d50af9aba950f43e807","signature_type":"Function","digest":{"length":13872,"function_hash":"233037532068098537505988791132617368492"}},{"deprecated":false,"target":{"file":"ext/pcre/pcrelib/pcre_jit_compile.c"},"id":"CVE-2017-9224-cfd9dfdb","signature_version":"v1","source":"https://github.com/php/php-src/commit/73915a2bd61f21fd809b4d50af9aba950f43e807","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["41612049881914751775057704412356952022","206133687184829194312361432760839012982","60469889591596012334583203454317370370","317056786488417399517652373716894105276"]}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-9224.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}