Description
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.
Exploits (2)
References (8)
Core 8
Core References
Release Notes x_refsource_misc
https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/kkos/oniguruma/issues/162
Exploit, Third Party Advisory x_refsource_misc
https://github.com/ManhNDd/CVE-2019-19204
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
Third Party Advisory x_refsource_misc
https://github.com/tarantula-team/CVE-2019-19204
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4460-1/
Scores
CVSS v3
7.5
EPSS
0.0895
EPSS Percentile
92.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (5)
debian/debian_linux
8.0
fedoraproject/fedora
30
fedoraproject/fedora
31
oniguruma_project/oniguruma
6.9.4 rc1
oniguruma_project/oniguruma
6.0.0 - 6.9.4
Published
Nov 21, 2019
Tracked Since
Feb 18, 2026