Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8389

Опубликовано: 02 дек. 2015
Источник: debian
EPSS Низкий

Описание

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcre3fixed2:8.38-1package
pcre3fixed2:8.35-3.3+deb8u2jessiepackage
pcre3not-affectedwheezypackage
pcre3not-affectedsqueezepackage

Примечания

  • Fixed in 8.38

  • Fixed by: http://vcs.pcre.org/pcre?view=revision&revision=1577

  • First bad commit: http://vcs.pcre.org/pcre?view=revision&revision=1440

  • Only after r1577 looks like there is another new issue (stack-buffer-underflow, READ of size 4 when running PoC)

EPSS

Процентиль: 82%
0.01711
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

redhat
больше 9 лет назад

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

CVSS3: 9.8
nvd
больше 9 лет назад

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

CVSS3: 9.8
github
больше 3 лет назад

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

suse-cvrf
больше 8 лет назад

Security update for pcre

EPSS

Процентиль: 82%
0.01711
Низкий