Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-8381
HistoryDec 01, 2015 - 12:00 a.m.

CVE-2015-8381

2015-12-0100:00:00
ubuntu.com
ubuntu.com
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.039 Low

EPSS

Percentile

92.0%

The compile_regex function in pcre_compile.c in PCRE before 8.38 and
pcre2_compile.c in PCRE2 before 10.2x mishandles the
/(?J:(?|(:(?|(?‘R’)(\k’R’)|((?‘R’)))H’Rk’Rf)|s(?‘R’))))/ and
/(?J:(?|(:(?|(?‘R’)(\z(?|(?‘R’)(\k’R’)|((?‘R’)))k’R’)|((?‘R’)))H’Ak’Rf)|s(?‘R’)))/
patterns, and related patterns with certain group references, which allows
remote attackers to cause a denial of service (heap-based buffer overflow)
or possibly have unspecified other impact via a crafted regular expression,
as demonstrated by a JavaScript RegExp object encountered by Konqueror.

Bugs

Notes

Author Note
tyhicks Marking ‘low’ since it requires PCRE to operate on untrusted regular expressions which is not very likely
mdeslaur introduced in 8.34 0001-Hack-in-yet-other-patch-for-a-bug-in-size-computatio.patch in jessie
OSVersionArchitecturePackageVersionFilename
ubuntu15.10noarchpcre3< 2:8.35-7.1ubuntu1.3UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.039 Low

EPSS

Percentile

92.0%