6.4
CVSSv2

CVE-2015-8382

Published: 02/12/2015 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The match function in pcre_exec.c in PCRE prior to 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote malicious users to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.

Vulnerable Product Search on Vulmon Subscribe to Product

pcre perl compatible regular expression library 8.36

Vendor Advisories

PCRE could be made to crash or run programs if it processed a specially-crafted regular expression ...
Debian Bug report logs - #806467 pcre3: CVE-2015-8380: Heap overflow / invalid write in fuction pcre_exec Package: src:pcre3; Maintainer for src:pcre3 is Matthew Vernon <matthew@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 27 Nov 2015 18:27:06 UTC Severity: normal Tags: fixed-upstream ...
Debian Bug report logs - #794589 pcre3: CVE-2015-8382: pcre_exec does not fill offsets for certain regexps Package: src:pcre3; Maintainer for src:pcre3 is Matthew Vernon <matthew@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 4 Aug 2015 17:57:02 UTC Severity: important Tags: patch, sec ...
The match function in pcre_execc in PCRE before 837 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application ...