Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8390

Опубликовано: 02 дек. 2015
Источник: debian
EPSS Низкий

Описание

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcre3fixed2:8.38-1package
pcre3fixed2:8.35-3.3+deb8u2jessiepackage
pcre3no-dsawheezypackage
pcre3no-dsasqueezepackage

Примечания

  • Fixed in 8.38

  • http://vcs.pcre.org/pcre?view=revision&revision=1578

EPSS

Процентиль: 88%
0.04063
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 10 лет назад

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

redhat
около 10 лет назад

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

CVSS3: 9.8
nvd
около 10 лет назад

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

CVSS3: 9.8
github
больше 3 лет назад

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

suse-cvrf
около 9 лет назад

Security update for pcre

EPSS

Процентиль: 88%
0.04063
Низкий