First published: Tue Jan 14 2020(Updated: )
The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pcre pcre | <8.37 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Mariadb Mariadb | <10.0.18 | |
PHP | >=5.4.0<5.4.41 | |
PHP | >=5.5.0<5.5.26 | |
PHP | >=5.6.0<5.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2015-2325.
The severity of CVE-2015-2325 is high with a CVSS score of 7.8.
The software versions affected by CVE-2015-2325 are PCRE before 8.37, OpenSUSE 13.1 and 13.2, MariaDB before 10.0.18, and PHP versions between 5.4.0 and 5.4.41, 5.5.0 and 5.5.26, and 5.6.0 and 5.6.9.
The impact of CVE-2015-2325 includes compiling incorrect code, causing a denial of service (out-of-bounds heap read and crash), and potentially having other unspecified impacts.
To fix CVE-2015-2325, it is recommended to update to a version of the affected software that is not vulnerable or apply any patches or security updates provided by the software vendor.