Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
- http://www.kb.cert.org/vuls/id/695940
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/SRVRS094ADM/ClamAV