Home CVE Database CVE-2015-8381

CVE-2015-8381

Description

The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?\'R\')(\\k\'R\')|((?\'R\')))H\'Rk\'Rf)|s(?\'R\'))))/ and /(?J:(?|(:(?|(?\'R\')(\\z(?|(?\'R\')(\\k\'R\')|((?\'R\')))k\'R\')|((?\'R\')))H\'Ak\'Rf)|s(?\'R\')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

Priority: High
CVSS v3: 0.0
Publish Date: Dec 1, 2015
Related ID: --
CVSS v2: 7.5
Modified Date: Dec 2, 2015

Find out more about CVE-2015-8381 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Related Products

Product Name Status Defect Fixed Downloads
Linux 7 SCP Not Vulnerable -- -- --
Linux 7 CGP Not Vulnerable -- -- --

Comments

pcre

Live chat
Online