CVE-2014-9769
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
pcre_jit_compile.c en PCRE 8.35 no utiliza correctamente saltos de tabla para optimizar alternativas anidadas, lo que permite a atacantes remotos causar una denegación de servicio (corrupción de la memoria de pila) o posiblemente tener otro impacto no especificado a través de una cadena manipulada, según lo demostrado por paquetes encontrados por Suricata durante el uso de una expresión regular en un conjunto de reglas Emerging Threats Open.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-03-28 CVE Reserved
- 2016-03-28 CVE Published
- 2023-04-10 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://vcs.pcre.org/pcre?view=revision&revision=1475 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2016/03/26/1 | Mailing List | |
http://www.securityfocus.com/bid/85570 | Vdb Entry | |
http://www.securitytracker.com/id/1035424 | Vdb Entry | |
https://bugs.debian.org/819050 | X_refsource_confirm | |
https://redmine.openinfosecfoundation.org/issues/1693 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|