CVE-2015-8382
Ubuntu Security Notice USN-2943-1
Severity Score
Exploit Likelihood
Affected Versions
1Public Exploits
2Exploited in Wild
-Decision
Descriptions
The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
La función match en pcre_exec.c en PCRE en versiones anteriores a 8.37 no maneja correctamente el patrón /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ y patrones relacionados que involucran (*ACCEPT), lo que permite a atacantes remotos obtener información sensible de la memoria de proceso o causar una denegación de servicio (memoria parcialmente inicializada y caída de aplicación) a través de una expresión regular manipulada, según lo demostrado por un objeto JavaScript RegExp encontrado por Konqueror, también conocida como ZDI-CAN-2547.
It was discovered that PCRE incorrectly handled certain regular expressions. A remote attacker could use this issue to cause applications using PCRE to crash, resulting in a denial of service, or possibly execute arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-01 CVE Reserved
- 2015-12-02 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Date | SRC |
---|
URL | Date | SRC |
---|