First published: Tue Jun 30 2015(Updated: )
Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <8.38 | 8.38 |
IBM PowerKVM | =2.1 | |
IBM PowerKVM | =3.1 | |
PCRE | <=8.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5073 has a medium severity rating due to the potential for denial of service and information disclosure.
To fix CVE-2015-5073, update PCRE to version 8.38 or later.
CVE-2015-5073 affects the PCRE library versions prior to 8.38.
CVE-2015-5073 is a heap-based buffer overflow vulnerability.
Yes, CVE-2015-5073 can potentially bypass the Address Space Layout Randomization (ASLR) protection mechanism.