Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-3191

Опубликовано: 17 мар. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

10.31-2
cosmic

not-affected

10.31-3
devel

not-affected

10.32-4
esm-apps/bionic

not-affected

10.31-2
esm-apps/xenial

not-affected

10.21-1
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

Показывать по

РелизСтатусПримечание
artful

not-affected

2:8.38-3
bionic

not-affected

2:8.38-3
cosmic

not-affected

2:8.38-3
devel

not-affected

2:8.38-3
esm-infra-legacy/trusty

not-affected

1:8.31-2ubuntu2.2
esm-infra/bionic

not-affected

2:8.38-3
esm-infra/xenial

not-affected

2:8.38-3
precise

not-affected

precise/esm

not-affected

trusty

released

1:8.31-2ubuntu2.2

Показывать по

EPSS

Процентиль: 90%
0.06286
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

redhat
больше 9 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

CVSS3: 9.8
nvd
больше 9 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

CVSS3: 9.8
debian
больше 9 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 ...

suse-cvrf
почти 9 лет назад

Security update for pcre2

CVSS3: 9.8
github
около 3 лет назад

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

EPSS

Процентиль: 90%
0.06286
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3