CVE-2015-8389
Summary
| CVE | CVE-2015-8389 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-12-02 01:59:00 UTC |
| Updated | 2023-02-16 14:15:00 UTC |
| Description | PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror. |
Risk And Classification
Problem Types: CWE-119 | CWE-185
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fedoraproject | Fedora | 22 | All | All | All |
| Operating System | Fedoraproject | Fedora | 22 | All | All | All |
| Application | Pcre | Perl Compatible Regular Expression Library | All | All | All | All |
| Application | Php | Php | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| December 2015 PCRE Vulnerabilities in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| ViewVC Exception | CONFIRM | vcs.pcre.org | Release Notes, Vendor Advisory |
| Broadcom Support Portal | CONFIRM | bto.bluecoat.com | Third Party Advisory |
| [SECURITY] Fedora 22 Update: pcre-8.38-1.fc22 | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| PCRE Multiple Security Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| libpcre: Multiple Vulnerabilities (GLSA 201607-02) — Gentoo security | GENTOO | security.gentoo.org | |
| oss-security - Re: Heap Overflow in PCRE | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.