First published: Thu Jun 04 2015(Updated: )
PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <8.38 | 8.38 |
PCRE2 | =10.10 | |
PCRE | =7.8 | |
PCRE | =8.32 | |
PCRE | =8.33 | |
PCRE | =8.34 | |
PCRE | =8.35 | |
PCRE | =8.36 | |
PCRE | =8.37 | |
IBM PowerKVM | =2.1 | |
IBM PowerKVM | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3217 has a high severity level due to its potential to cause denial of service via stack-based buffer overflow.
To fix CVE-2015-3217, update to PCRE version 8.38 or later.
CVE-2015-3217 affects PCRE versions 7.8, 8.32 through 8.37, and PCRE2 version 10.10.
Yes, CVE-2015-3217 can be exploited remotely through a crafted regular expression.
CVE-2015-3217 represents a stack-based buffer overflow vulnerability.