Описание
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
mongodb | removed | package | ||
pcre3 | fixed | 2:8.35-7.2 | package | |
pcre3 | fixed | 2:8.35-3.3+deb8u2 | jessie | package |
pcre3 | no-dsa | wheezy | package | |
pcre3 | no-dsa | squeeze | package |
Примечания
CVE for bundled version of pcre3 in mongodb
https://jira.mongodb.org/browse/SERVER-17252
Since 1:2.0.0-1 mongodb uses the system pcre3
https://bugs.exim.org/show_bug.cgi?id=1515
Fixed by: http://vcs.pcre.org/pcre?view=revision&revision=1498
https://www.openwall.com/lists/oss-security/2015/05/31/4
EPSS
Связанные уязвимости
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
EPSS