Vulnerability Description
An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Erlang | Erlang\/Otp | 18.0 |
Related Weaknesses (CWE)
References
- https://github.com/erlang/otp/pull/1108Third Party Advisory
- https://usn.ubuntu.com/3571-1/Third Party Advisory
- https://github.com/erlang/otp/pull/1108Third Party Advisory
- https://usn.ubuntu.com/3571-1/Third Party Advisory
FAQ
What is CVE-2016-10253?
CVE-2016-10253 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specif...
How severe is CVE-2016-10253?
CVE-2016-10253 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10253?
Check the references section above for vendor advisories and patch information. Affected products include: Erlang Erlang\/Otp.