CVE-2015-2305

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-2305
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2015-2305.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2015-2305
Downstream
Related
Published
2015-03-30T10:59:11Z
Modified
2025-08-09T20:01:28Z
Summary
[none]
Details

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.

References

Affected packages