The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Henry Spencer regex, PHP, MySQL: buffer overflow of regcomp

Synthesis of the vulnerability 

An attacker can generate a buffer overflow in the regcomp() function of Henry Spencer regex, in order to trigger a denial of service, and possibly to execute code.
Vulnerable systems: Arkoon FAST360, Debian, Fedora, HP-UX, MySQL Community, MySQL Enterprise, openSUSE, Percona Server, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive.
Severity of this threat: 2/4.
Creation date: 18/03/2015.
Références of this weakness: c04686230, CERTFR-2015-AVI-187, CVE-2015-2305, DSA-3195-1, FEDORA-2015-4216, FEDORA-2015-4236, HPSBUX03337, openSUSE-SU-2015:0644-1, RHSA-2015:1053-01, RHSA-2015:1066-01, SSA:2015-111-10, SSRT102066, STORM-2015-09-EN, STORM-2015-10-EN, STORM-2015-11-EN.2, STORM-2015-12-EN, SUSE-SU-2015:0868-1, SUSE-SU-2016:1638-1, USN-2572-1, VIGILANCE-VUL-16412.

Description of the vulnerability 

The Henry Spencer regex library implements the support of regular expressions. It is used by PHP and MySQL.

The regcomp() function generates a data structure representing a regular expression.

However, if the size of data is greater than the size of the storage array, an overflow occurs in regcomp().

An attacker can therefore generate a buffer overflow in the regcomp() function of Henry Spencer regex, in order to trigger a denial of service, and possibly to execute code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability alert impacts software or systems such as Arkoon FAST360, Debian, Fedora, HP-UX, MySQL Community, MySQL Enterprise, openSUSE, Percona Server, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive.

Our Vigil@nce team determined that the severity of this computer weakness alert is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer vulnerability.

Solutions for this threat 

PHP: version 5.6.7.
The version 5.6.7 is fixed:
  http://php.net/downloads

PHP: version 5.5.23.
The version 5.5.23 is fixed:
  http://php.net/downloads

PHP: version 5.4.39.
The version 5.4.39 is fixed:
  http://php.net/downloads

Henry Spencer regex, PHP, MySQL: patch for regcomp.
A patch is available in information sources.

Arkoon Fast360: version 5.0/35.
The version 5.0/35 is fixed.

Arkoon Fast360: version 6.0/9.
The version 6.0/9 is fixed.

Debian: new php5 packages (18/03/2015).
New packages are available:
  Debian 7: php5 5.4.38-0+deb7u1

Fedora: new php packages.
New packages are available:
  Fedora 20: php 5.5.23-1.fc20
  Fedora 21: php 5.6.7-1.fc21

HP-UX Apache Web Server: version 4.05.
The version 4.05 is fixed:
  http://software.hp.com/

openSUSE: new php5 packages.
New packages are available:
  openSUSE 13.1: apache2-mod_php5 5.4.20-45.1, php5 5.4.20-45.1
  openSUSE 13.2: apache2-mod_php5 5.6.1-15.1, php5 5.6.1-15.1

RHEL: new php54 packages.
New packages are available:
  RHEL 6: php54 2.0-1.el6
  RHEL 7: php54 2.0-1.el7

RHEL: new php55 packages.
New packages are available:
  RHEL 6: php55 2.0-1.el6
  RHEL 7: php55 2.0-1.el7

Slackware: new php packages.
New packages are available:
  Slackware 14.0: php 5.4.40-*-1_slack14.0
  Slackware 14.1: php 5.4.40-*-1_slack14.1

SUSE LE 11 SP2: new php53 packages (21/06/2016).
New packages are available:
  SUSE LE 11 SP2: apache2-mod_php53 5.3.17-47.1, php53 5.3.17-47.1

SUSE LE Development 12: new php5 packages.
New packages are available:
  SUSE LE 12: apache2-mod_php5 5.5.14-22.1, php5 5.5.14-22.1

Ubuntu: new php5 packages (21/04/2015).
New packages are available:
  Ubuntu 14.10: php5 5.5.12+dfsg-2ubuntu4.4
  Ubuntu 14.04 LTS: php5 5.5.9+dfsg-1ubuntu4.9
  Ubuntu 12.04 LTS: php5 5.3.10-1ubuntu3.18
  Ubuntu 10.04 LTS: php5 5.3.2-1ubuntu4.30
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an application vulnerability database. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.