Описание
PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Directory Server 8 | pcre | Will not fix | ||
Red Hat Enterprise Linux 5 | pcre | Will not fix | ||
Red Hat Enterprise Linux 6 | glib2 | Will not fix | ||
Red Hat Enterprise Linux 6 | pcre | Will not fix | ||
Red Hat Enterprise Linux 7 | glib2 | Will not fix | ||
Red Hat Enterprise Linux 7 | virtuoso-opensource | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | httpd | Will not fix | ||
Red Hat JBoss Enterprise Web Server 2 | httpd | Will not fix | ||
Red Hat JBoss Enterprise Web Server 3 | pcre | Will not fix | ||
Red Hat Software Collections | php54-php | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
2.6 Low
CVSS2
Связанные уязвимости
PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
PCRE before 8.38 mishandles the interaction of lookbehind assertions a ...
PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
EPSS
2.6 Low
CVSS2