First published: Wed Dec 02 2015(Updated: )
PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Linux | =7 | |
PCRE | <=8.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2328 has a high severity level due to its potential to cause denial of service through crafted regular expressions.
To fix CVE-2015-2328, upgrade to PCRE version 8.36 or higher.
CVE-2015-2328 affects PCRE versions up to 8.35 and Oracle Linux 7.
CVE-2015-2328 can lead to segmentation faults or potentially other unspecified impacts when triggered.
No, CVE-2015-2328 is not a code injection vulnerability but rather a denial of service issue related to regular expressions.