Description
The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-10444 | The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis). |
Ubuntu USN |
USN-3257-1 | WebKitGTK+ vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T02:59:03.313Z
Reserved: 2016-11-26T00:00:00.000Z
Link: CVE-2016-9643
No data.
Status : Modified
Published: 2017-03-07T16:59:01.650
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-9643
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN