Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3217

Опубликовано: 03 июн. 2015
Источник: redhat
CVSS2: 4.3

Описание

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\.|([^\\W_])?)+)+$/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Directory Server 8pcreNot affected
Red Hat Enterprise Linux 5pcreNot affected
Red Hat Enterprise Linux 6glib2Will not fix
Red Hat Enterprise Linux 6pcreWill not fix
Red Hat Enterprise Linux 7glib2Will not fix
Red Hat Enterprise Linux 7virtuoso-opensourceWill not fix
Red Hat JBoss Enterprise Web Server 1httpdNot affected
Red Hat JBoss Enterprise Web Server 2httpdNot affected
Red Hat JBoss Enterprise Web Server 3pcreWill not fix
Red Hat Software Collectionsphp54-phpWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-674
https://bugzilla.redhat.com/show_bug.cgi?id=1228283pcre: stack overflow caused by mishandled group empty match (8.38/11)

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

CVSS3: 7.5
nvd
больше 8 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

CVSS3: 7.5
debian
больше 8 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty ...

CVSS3: 7.5
github
около 3 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

oracle-oval
около 9 лет назад

ELSA-2016-1025: pcre security update (IMPORTANT)

4.3 Medium

CVSS2