CVE-2015-8382
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
La función match en pcre_exec.c en PCRE en versiones anteriores a 8.37 no maneja correctamente el patrón /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ y patrones relacionados que involucran (*ACCEPT), lo que permite a atacantes remotos obtener información sensible de la memoria de proceso o causar una denegación de servicio (memoria parcialmente inicializada y caída de aplicación) a través de una expresión regular manipulada, según lo demostrado por un objeto JavaScript RegExp encontrado por Konqueror, también conocida como ZDI-CAN-2547.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-01 CVE Reserved
- 2015-12-02 CVE Published
- 2023-05-13 EPSS Updated
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834 | X_refsource_confirm | |
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2015/08/04/3 | Mailing List | |
http://www.openwall.com/lists/oss-security/2015/11/29/1 | Mailing List | |
http://www.securityfocus.com/bid/76157 | Vdb Entry | |
https://bto.bluecoat.com/security-advisory/sa128 | X_refsource_confirm | |
https://bugzilla.redhat.com/show_bug.cgi?id=1187225 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | 2024-08-06 | |
https://bugs.exim.org/show_bug.cgi?id=1537 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Pcre Search vendor "Pcre" | Perl Compatible Regular Expression Library Search vendor "Pcre" for product "Perl Compatible Regular Expression Library" | 8.36 Search vendor "Pcre" for product "Perl Compatible Regular Expression Library" and version "8.36" | - |
Affected
|