Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v59w-72qc-xg55

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.

EPSS

Процентиль: 76%
0.00934
Низкий

7.3 High

CVSS3

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 10 лет назад

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.

redhat
почти 10 лет назад

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.

CVSS3: 7.3
nvd
почти 10 лет назад

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.

CVSS3: 7.3
debian
почти 10 лет назад

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to o ...

EPSS

Процентиль: 76%
0.00934
Низкий

7.3 High

CVSS3

Дефекты

CWE-119