Wind River Support Network

HomeDefectsLIN6-10628
Fixed

LIN6-10628 : Security Advisory - pcre - CVE-2015-2328

Created: Dec 14, 2015    Updated: Dec 3, 2018
Resolved Date: Dec 24, 2015
Found In Version: 6.0.0.26
Fix Version: 6.0.0.27
Severity: Standard
Applicable for: Wind River Linux 6
Component/s: Userspace

Description

PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2328

Steps to Reproduce

Reproduce
=========
root@qemu14:/# ./pcretest 
PCRE version 8.33 2013-05-28

  re> /((?(R)a|(?1)))*/
pcretest[2024]: segfault at 7ffd34288ff8 ip 00000031c0401827 sp 00007ffd34289000 error 6 in libpcre.so.1.2.1[31c0400000+27000]
Segmentation fault

Verify
=======
root@qemu14:/# rpm   -ivh   libpcre1-8.33-r1.7.x86_64.rpm 
Preparing...                ########################################### [100%]
   1:libpcre1               ########################################### [100%]
root@qemu14:/# ./pcretest 
PCRE version 8.33 2013-05-28

  re> /((?(R)a|(?1)))*/
data> abcd
 0: a
 1: a
data> 

Other Downloads


Live chat
Online