CVE-2015-8393
Ubuntu Security Notice USN-2943-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
pcregrep en PCRE en versiones anteriores a 8.38 no maneja correctamente la opción -q para archivos binarios, lo que podría permitir a atacantes remotos obtener información sensible a través de un archivo manipulado, según lo demostrado por una secuencia de comandos CGI que envía datos stdout a un cliente.
Multiple potential remote and local vulnerabilities impacting Perl and PHP have been addressed by HPE NonStop Servers OSS Script Languages. The vulnerabilities include Perl's opportunistic loading of optional modules which might allow local users to gain elevation of privilege via a Trojan horse library under the current working directory. Revision 1 of this advisory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-01 CVE Reserved
- 2015-12-02 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | Release Notes | |
http://www.openwall.com/lists/oss-security/2015/11/29/1 | Mailing List |
|
http://www.securityfocus.com/bid/82990 | Third Party Advisory | |
https://bto.bluecoat.com/security-advisory/sa128 | Third Party Advisory | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 | Third Party Advisory | |
https://security.netapp.com/advisory/ntap-20230216-0002 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html | 2023-02-16 | |
https://security.gentoo.org/glsa/201607-02 | 2023-02-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Pcre Search vendor "Pcre" | Perl Compatible Regular Expression Library Search vendor "Pcre" for product "Perl Compatible Regular Expression Library" | <= 8.37 Search vendor "Pcre" for product "Perl Compatible Regular Expression Library" and version " <= 8.37" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 22 Search vendor "Fedoraproject" for product "Fedora" and version "22" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.5.0 < 5.5.32 Search vendor "Php" for product "Php" and version " >= 5.5.0 < 5.5.32" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.6.0 < 5.6.18 Search vendor "Php" for product "Php" and version " >= 5.6.0 < 5.6.18" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 7.0.0 < 7.0.3 Search vendor "Php" for product "Php" and version " >= 7.0.0 < 7.0.3" | - |
Affected
|