Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-3210
HistoryJun 01, 2015 - 12:00 a.m.

CVE-2015-3210

2015-06-0100:00:00
ubuntu.com
ubuntu.com
15

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.137 Low

EPSS

Percentile

95.6%

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows
remote attackers to execute arbitrary code via a crafted regular
expression, as demonstrated by
/^(?P=B)((?P=B)(?J:(?P<b>c)(?P<b>a(?P=B)))>WGXCREDITS)/, a different
vulnerability than CVE-2015-8384.

Bugs

Notes

Author Note
seth-arnold “A number of such bugs have recently been discovered by fuzzers”, it might be a good idea to trawl the source repo for more such fixes.
mdeslaur Debian claims introduced in http://vcs.pcre.org/pcre?view=revision&amp;revision=1361 was supposed to be fixed in wily (2:8.35-7ubuntu2) but got reverted in (2:8.35-7ubuntu5) by mistake CVE-2015-2325_CVE-2015-2326_CVE-2015-3210_CVE-2015-5073.patch in jessie
OSVersionArchitecturePackageVersionFilename
ubuntu15.04noarchpcre3< 2:8.35-3.3ubuntu1.1UNKNOWN
ubuntu15.10noarchpcre3< 2:8.35-7.1ubuntu1.3UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.137 Low

EPSS

Percentile

95.6%