5
CVSSv2

CVE-2014-8964

Published: 16/12/2014 Updated: 04/08/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Heap-based buffer overflow in PCRE 8.36 and previous versions allows remote malicious users to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pcre pcre

mariadb mariadb

fedoraproject fedora 20

fedoraproject fedora 21

fedoraproject fedora 19

opensuse opensuse 13.1

opensuse opensuse 13.2

oracle solaris 11.2

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server tus 7.3

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux eus 7.3

redhat enterprise linux eus 7.4

redhat enterprise linux eus 7.5

redhat enterprise linux eus 7.6

redhat enterprise linux eus 7.7

redhat enterprise linux server aus 7.7

redhat enterprise linux server aus 7.6

redhat enterprise linux server tus 7.6

redhat enterprise linux server tus 7.7

Vendor Advisories

PCRE could be made to crash or run programs if it processed a specially-crafted regular expression ...
Debian Bug report logs - #770478 pcre3: CVE-2014-8964: heap buffer overflow Package: src:pcre3; Maintainer for src:pcre3 is Matthew Vernon <matthew@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 21 Nov 2014 15:39:07 UTC Severity: important Tags: patch, security, upstream Found in versi ...
A flaw was found in the way PCRE handled certain malformed regular expressions This issue could cause an application linked against PCRE to crash while parsing malicious regular expressions ...
A flaw was found in the way PCRE handled certain malformed regular expressions This issue could cause an application (for example, Konqueror) linked against PCRE to crash while parsing malicious regular expressions ...