Vulnerability Details : CVE-2015-2328
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2015-2328
- cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-2328
2.58%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-2328
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2015-2328
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-2328
-
https://jira.mongodb.org/browse/SERVER-17252
[SERVER-17252] Upgrade PCRE Version from 8.30 to Latest - MongoDBThird Party Advisory
-
http://www.securityfocus.com/bid/74924
PCRE 'compile_regex()' Function Stack Buffer Overflow Vulnerability
-
http://www.fortiguard.com/advisory/FG-VD-15-014/
FortiGuardThird Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Oracle Linux Bulletin - April 2016Third Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
IBM Security Bulletin: Multiple vulnerabilities in PCRE affect PowerKVM
-
https://bugs.exim.org/show_bug.cgi?id=1515
Bug 1515 – PCRE Call Stack Overflow VulnerabilityExploit
-
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
ViewVC ExceptionExploit
-
http://rhn.redhat.com/errata/RHSA-2016-1025.html
RHSA-2016:1025 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-2750.html
RHSA-2016:2750 - Security Advisory - Red Hat Customer Portal
-
http://www.openwall.com/lists/oss-security/2015/11/29/1
oss-security - Re: Heap Overflow in PCREThird Party Advisory
Jump to