Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3191

Опубликовано: 17 мар. 2016
Источник: debian
EPSS Низкий

Описание

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcre3fixed2:8.38-2package
pcre3fixed2:8.35-3.3+deb8u3jessiepackage
pcre3no-dsawheezypackage
pcre2fixed10.21-1package

Примечания

  • pcre3: http://vcs.pcre.org/pcre?view=revision&revision=1631

  • pcre2: http://vcs.pcre.org/pcre2?view=revision&revision=489

  • https://bugs.exim.org/show_bug.cgi?id=1791

  • https://bugzilla.redhat.com/show_bug.cgi?id=1311503

EPSS

Процентиль: 90%
0.06286
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

redhat
больше 9 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

CVSS3: 9.8
nvd
больше 9 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

suse-cvrf
почти 9 лет назад

Security update for pcre2

CVSS3: 9.8
github
около 3 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

EPSS

Процентиль: 90%
0.06286
Низкий