CVE-2015-8381
Summary
| CVE | CVE-2015-8381 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-12-02 01:59:00 UTC |
| Updated | 2018-01-05 02:30:00 UTC |
| Description | The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| ViewVC Exception |
CONFIRM |
vcs.pcre.org |
Exploit, Release Notes |
| Broadcom Support Portal |
CONFIRM |
bto.bluecoat.com |
Third Party Advisory |
| Bug 1667 – PCRE Library Heap Overflow Vulnerability |
CONFIRM |
bugs.exim.org |
Exploit |
| libpcre: Multiple Vulnerabilities (GLSA 201607-02) — Gentoo security |
GENTOO |
security.gentoo.org |
|
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| oss-security - Re: Heap Overflow in PCRE |
MLIST |
www.openwall.com |
Mailing List, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
rhn.redhat.com |
|
| Bug 1672 – PCRE Library Heap Overflow in compile_regex() |
CONFIRM |
bugs.exim.org |
Exploit |
| PCRE Regular Expression Handling Heap Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 20390 IBM DB2 Multiple Vulnerabilities (7087225)