7.5
CVSSv2

CVE-2015-8380

Published: 02/12/2015 Updated: 01/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The pcre_exec function in pcre_exec.c in PCRE prior to 8.38 mishandles a // pattern with a \01 string, which allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

Vulnerable Product Search on Vulmon Subscribe to Product

pcre perl compatible regular expression library

fedoraproject fedora 22

Vendor Advisories

PCRE could be made to crash or run programs if it processed a specially-crafted regular expression ...
Debian Bug report logs - #806467 pcre3: CVE-2015-8380: Heap overflow / invalid write in fuction pcre_exec Package: src:pcre3; Maintainer for src:pcre3 is Matthew Vernon <matthew@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 27 Nov 2015 18:27:06 UTC Severity: normal Tags: fixed-upstream ...