Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-8388
HistoryDec 01, 2015 - 12:00 a.m.

CVE-2015-8388

2015-12-0100:00:00
ubuntu.com
ubuntu.com
14

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.2%

PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and
related patterns with an unmatched closing parenthesis, which allows remote
attackers to cause a denial of service (buffer overflow) or possibly have
unspecified other impact via a crafted regular expression, as demonstrated
by a JavaScript RegExp object encountered by Konqueror.

Bugs

Notes

Author Note
tyhicks Issue affects PCRE3 only Marking ‘low’ since it requires PCRE to operate on untrusted regular expressions which is not very likely Fix for CVE-2015-5073 also fixes this issue
mdeslaur was supposed to be fixed in wily (2:8.35-7ubuntu2) but got reverted in (2:8.35-7ubuntu5) by mistake CVE-2015-2325_CVE-2015-2326_CVE-2015-3210_CVE-2015-5073.patch in jessie
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarchpcre3< 8.12-4ubuntu0.1UNKNOWN
ubuntu14.04noarchpcre3< 1:8.31-2ubuntu2.1UNKNOWN
ubuntu15.04noarchpcre3< 2:8.35-3.3ubuntu1.1UNKNOWN
ubuntu15.10noarchpcre3< 2:8.35-7.1ubuntu1.3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.2%