Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8384

Опубликовано: 02 дек. 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5

Описание

PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

issue affects PCRE3 only
devel

not-affected

issue affects PCRE3 only
esm-apps/bionic

not-affected

issue affects PCRE3 only
esm-apps/xenial

not-affected

issue affects PCRE3 only
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
artful

not-affected

2:8.38-3
bionic

not-affected

2:8.38-3
devel

not-affected

2:8.38-3
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

2:8.38-3
esm-infra/xenial

not-affected

2:8.38-3
precise

not-affected

precise/esm

not-affected

trusty

not-affected

code not present
trusty/esm

not-affected

code not present

Показывать по

EPSS

Процентиль: 78%
0.01192
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
около 10 лет назад

PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.

nvd
около 10 лет назад

PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.

debian
около 10 лет назад

PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and re ...

github
больше 3 лет назад

PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.

suse-cvrf
около 9 лет назад

Security update for pcre

EPSS

Процентиль: 78%
0.01192
Низкий

7.5 High

CVSS2