First published: Thu Jan 29 2015(Updated: )
It was reported that pcre_exec in PHP pcre extension partially initialize a buffer when an invalid regex is processed, which can information disclosure. A mitigation fix have been applied in PHP 5.4+ <a href="http://git.php.net/?p=php-src.git;a=commitdiff;h=c351b47ce85a3a147cfa801fa9f0149ab4160834">http://git.php.net/?p=php-src.git;a=commitdiff;h=c351b47ce85a3a147cfa801fa9f0149ab4160834</a> Upstream bug report (with a patch proposal): <a href="http://bugs.exim.org/show_bug.cgi?id=1537">http://bugs.exim.org/show_bug.cgi?id=1537</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PCRE (Perl Compatible Regular Expressions) | =8.36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8382 has been classified with a severity that allows for information disclosure potential.
To mitigate CVE-2015-8382, ensure you are using PHP version 5.4 or higher where patch fixes have been applied.
CVE-2015-8382 affects the PCRE library versions up to and including 8.36.
Yes, CVE-2015-8382 can lead to scenarios where an attacker may exploit buffer initialization issues to disclose sensitive information.
Yes, PHP versions 5.4 and above include mitigations for the vulnerability outlined in CVE-2015-8382.