First published: Tue Jan 14 2020(Updated: )
The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pcre Pcre | <8.37 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Mariadb Mariadb | >=10.0.0<10.0.18 | |
PHP PHP | >=5.4.0<5.4.41 | |
PHP PHP | >=5.5.0<5.5.26 | |
PHP PHP | >=5.6.0<5.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-2326.
The severity of CVE-2015-2326 is medium.
PCRE before version 8.37, Opensuse 13.1 and 13.2, MariaDB version 10.0.0 to 10.0.18, PHP version 5.4.0 to 5.4.41, PHP version 5.5.0 to 5.5.26, and PHP version 5.6.0 to 5.6.9 are affected by CVE-2015-2326.
An attacker can exploit CVE-2015-2326 by using a regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, causing a denial of service (out-of-bounds read).
Yes, updating to PCRE version 8.37 or later, Opensuse 13.1 or 13.2, MariaDB version 10.0.18 or later, or PHP version 5.4.41 or later, 5.5.26 or later, or 5.6.9 or later will fix CVE-2015-2326.