First published: Thu Nov 20 2014(Updated: )
Heap buffer overflow issue was reported in PCRE when processing a specially crafted regular expressions: <a href="http://bugs.exim.org/show_bug.cgi?id=1546">http://bugs.exim.org/show_bug.cgi?id=1546</a> Upstream patch for this: <a href="http://www.exim.org/viewvc/pcre2?view=rev&revision=154">http://www.exim.org/viewvc/pcre2?view=rev&revision=154</a> The next upstream release that will contain the above fix is likely to be around Feb/Mar next year (2015).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <8.37 | 8.37 |
pcre pcre | <=8.36 | |
Ariadne CMS | >=10.0.0<10.0.18 | |
Fedora | =19 | |
Fedora | =20 | |
Fedora | =21 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Oracle Solaris SPARC | =11.2 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.3 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8964 is classified as a high severity vulnerability due to the potential for arbitrary code execution from a heap buffer overflow.
To fix CVE-2014-8964, update PCRE to version 8.37 or later.
CVE-2014-8964 affects various versions of PCRE across multiple platforms including Red Hat, Fedora, OpenSUSE, and Oracle Solaris.
CVE-2014-8964 is a heap buffer overflow vulnerability that occurs when processing specially crafted regular expressions.
CVE-2014-8964 was reported through the Exim bug tracking system.