Vulnerability Details : CVE-2015-3217
Potential exploit
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2015-3217
- cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre:7.8:*:*:*:*:*:*:*
- cpe:2.3:a:pcre:pcre2:10.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3217
1.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3217
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2015-3217
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3217
-
http://www.securityfocus.com/bid/75018
PCRE 'match()' Function Stack Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2015/06/03/7
oss-security - CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match()Mailing List
-
https://bugs.exim.org/show_bug.cgi?id=1638
Bug 1638 – PCRE Library Call Stack Overflow Vulnerability in match()Exploit;Issue Tracking;Vendor Advisory
-
http://vcs.pcre.org/pcre?view=revision&revision=1566
ViewVC ExceptionPatch
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Oracle Linux Bulletin - April 2016
-
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
IBM Security Bulletin: Multiple vulnerabilities in PCRE affect PowerKVMThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1228283
1228283 – (CVE-2015-3217) CVE-2015-3217 pcre: stack overflow caused by mishandled group empty match (8.38/11)Issue Tracking
-
https://access.redhat.com/errata/RHSA-2016:1132
RHSA-2016:1132 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-1025.html
RHSA-2016:1025 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-2750.html
RHSA-2016:2750 - Security Advisory - Red Hat Customer Portal
Jump to