Vulnerability Description
The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webkit | Webkit | 2.4.11 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/11/26/2Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/11/26/5Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/94559
- http://www.securitytracker.com/id/1038137
- https://security.gentoo.org/glsa/201706-15
- http://www.openwall.com/lists/oss-security/2016/11/26/2Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/11/26/5Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/94559
- http://www.securitytracker.com/id/1038137
- https://security.gentoo.org/glsa/201706-15
FAQ
What is CVE-2016-9643?
CVE-2016-9643 is a vulnerability with a CVSS score of 7.5 (HIGH). The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and ...
How severe is CVE-2016-9643?
CVE-2016-9643 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9643?
Check the references section above for vendor advisories and patch information. Affected products include: Webkit Webkit.