7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.004 Low
EPSS
Percentile
72.4%
Severity: Low
Date : 2019-03-03
CVE-ID : CVE-2017-11164
Package : pcre
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-351
The package pcre before version 8.43-1 is vulnerable to denial of
service.
Upgrade to 8.43-1.
The problem has been fixed upstream in version 8.43.
None.
In PCRE 8.41, the OP_KETRMAX feature in the match function in
pcre_exec.c allows stack exhaustion (uncontrolled recursion) when
processing a crafted regular expression.
A remote attacker can crash the process with a crafted regular
expression.
http://seclists.org/oss-sec/2017/q3/111
https://bugzilla.redhat.com/show_bug.cgi?id=1470107
https://security.archlinux.org/CVE-2017-11164
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.004 Low
EPSS
Percentile
72.4%