Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2326

Опубликовано: 14 янв. 2020
Источник: debian
EPSS Низкий

Описание

The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcre3fixed2:8.35-7.2package
pcre3fixed2:8.35-3.3+deb8u1jessiepackage
pcre3not-affectedwheezypackage
pcre3not-affectedsqueezepackage

Примечания

  • http://bugs.exim.org/show_bug.cgi?id=1592

  • http://vcs.pcre.org/pcre?view=revision&revision=1529

  • Reproduced invalid read in pcre3/2:8.35-3.3

  • Issue introduced as a side effect of refactoring happened between 8.33 and 8.36

EPSS

Процентиль: 53%
0.00304
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 5 лет назад

The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".

redhat
около 10 лет назад

The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".

CVSS3: 5.5
nvd
больше 5 лет назад

The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".

CVSS3: 5.5
github
около 3 лет назад

The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".

suse-cvrf
почти 10 лет назад

Security update for mariadb

EPSS

Процентиль: 53%
0.00304
Низкий