Описание
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2:8.38-3.1 |
| esm-infra-legacy/trusty | not-affected | 1:8.31-2ubuntu2.1 |
| esm-infra/xenial | not-affected | 2:8.38-3.1 |
| precise | not-affected | 8.12-4ubuntu0.1 |
| precise/esm | not-affected | 8.12-4ubuntu0.1 |
| trusty | not-affected | 1:8.31-2ubuntu2.1 |
| trusty/esm | not-affected | 1:8.31-2ubuntu2.1 |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | ignored | end of life, was pending |
| vivid/ubuntu-core | released | 2:8.35-3.3ubuntu1.2 |
Показывать по
EPSS
7.5 High
CVSS2
7.3 High
CVSS3
Связанные уязвимости
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to o ...
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
EPSS
7.5 High
CVSS2
7.3 High
CVSS3