Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-8380
HistoryDec 01, 2015 - 12:00 a.m.

CVE-2015-8380

2015-12-0100:00:00
ubuntu.com
ubuntu.com
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.067 Low

EPSS

Percentile

93.7%

The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a //
pattern with a \01 string, which allows remote attackers to cause a denial
of service (heap-based buffer overflow) or possibly have unspecified other
impact via a crafted regular expression, as demonstrated by a JavaScript
RegExp object encountered by Konqueror.

Bugs

Notes

Author Note
tyhicks Issue affects PCRE3 only Marking ‘low’ since it requires PCRE to operate on untrusted regular expressions which is not very likely
mdeslaur 0001-Fix-overflow-when-ovector-has-size-1.patch in jessie
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchpcre3< 1:8.31-2ubuntu2.2UNKNOWN
ubuntu15.10noarchpcre3< 2:8.35-7.1ubuntu1.3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.067 Low

EPSS

Percentile

93.7%