First published: Wed Dec 02 2015(Updated: )
PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE (Perl Compatible Regular Expressions) | <=8.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2327 has a severity rating that can lead to a denial of service due to a segmentation fault.
To fix CVE-2015-2327, upgrade to PCRE version 8.36 or later.
CVE-2015-2327 is caused by mishandling of certain internal recursive back references in specific regular expression patterns.
Remote attackers can exploit CVE-2015-2327 by sending crafted regular expressions to vulnerable PCRE versions.
CVE-2015-2327 affects systems using PCRE versions prior to 8.36.