oss-sec mailing list archives
Re: Re: CVE Request - roundcubemail
From: Florian Weimer <fw () deneb enyo de>
Date: Wed, 17 Dec 2008 21:27:44 +0100
* Steven M. Christey:
The general issue of /e in preg_replace is covered by CWE-624 Executable Regular Expression Error (http://cwe.mitre.org/data/definitions/624.html) which has a couple other CVE examples.
Thanks for the reference.
I bet there's a chunk of these in various applications. I believe Perl has similar functionality.
Not quite, the s///e operator uses a compile-time transformation for the replacement expression, so it shouldn't be affected by this very issue. \Q \E pairs are an issue in the pattern, not the replacement. Mistakes in this area increase the attack surface by exposing the regular expression compiler to potentially hostile input, and it may lead to denial-of-service vulnerabilities because some implementations do not cope well with certain patterns. Perhaps CWE-624 should be split to reflect this?
Current thread:
- CVE Request - roundcubemail Jan Lieskovsky (Dec 12)
- Re: CVE Request - roundcubemail Raphael Geissert (Dec 13)
- Re: Re: CVE Request - roundcubemail Florian Weimer (Dec 13)
- Re: Re: CVE Request - roundcubemail Florian Weimer (Dec 13)
- Re: Re: CVE Request - roundcubemail Florian Weimer (Dec 13)
- Re: Re: CVE Request - roundcubemail Steven M. Christey (Dec 16)
- Re: Re: CVE Request - roundcubemail Jan Lieskovsky (Dec 17)
- Re: Re: CVE Request - roundcubemail Florian Weimer (Dec 17)
- Re: Re: CVE Request - roundcubemail Steven M. Christey (Dec 24)
- Re: Re: CVE Request - roundcubemail Florian Weimer (Dec 28)
- Re: Re: CVE Request - roundcubemail Florian Weimer (Dec 13)
- Re: CVE Request - roundcubemail Raphael Geissert (Dec 13)
- Re: Re: CVE Request - roundcubemail Jan Lieskovsky (Dec 15)
- Re: Re: CVE Request - roundcubemail Florian Weimer (Dec 15)
- Re: Re: CVE Request - roundcubemail Christian Hoffmann (Dec 15)
- Re: Re: CVE Request - roundcubemail Raphael Geissert (Dec 16)