Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3217

Опубликовано: 13 дек. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\.|([^\\W_])?)+)+$/.

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

not-affected

precise

not-affected

trusty

not-affected

trusty/esm

not-affected

upstream

needed

utopic

not-affected

vivid

not-affected

Показывать по

EPSS

Процентиль: 86%
0.02892
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

CVSS3: 7.5
nvd
больше 8 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

CVSS3: 7.5
debian
больше 8 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty ...

CVSS3: 7.5
github
около 3 лет назад

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.

oracle-oval
около 9 лет назад

ELSA-2016-1025: pcre security update (IMPORTANT)

EPSS

Процентиль: 86%
0.02892
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Уязвимость CVE-2015-3217