Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3210

Опубликовано: 13 дек. 2016
Источник: debian

Описание

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcre3fixed2:8.35-7.2package
pcre3fixed2:8.35-3.3+deb8u1jessiepackage
pcre3not-affectedwheezypackage
pcre3not-affectedsqueezepackage

Примечания

  • https://bugs.exim.org/show_bug.cgi?id=1636

  • Fixed by: http://vcs.pcre.org/pcre?view=revision&revision=1558

  • Affected code refactored in: http://vcs.pcre.org/pcre?view=revision&revision=1359 (8.34)

  • Issue then introduced by: http://vcs.pcre.org/pcre?view=revision&revision=1361

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.

redhat
около 10 лет назад

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.

CVSS3: 9.8
nvd
около 9 лет назад

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.

CVSS3: 9.8
github
больше 3 лет назад

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.

suse-cvrf
около 9 лет назад

Security update for pcre