First published: Wed Feb 24 2016(Updated: )
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pcre Pcre | =8.00 | |
Pcre Pcre | =8.01 | |
Pcre Pcre | =8.02 | |
Pcre Pcre | =8.10 | |
Pcre Pcre | =8.11 | |
Pcre Pcre | =8.12 | |
Pcre Pcre | =8.13 | |
Pcre Pcre | =8.20 | |
Pcre Pcre | =8.21 | |
Pcre Pcre | =8.30 | |
Pcre Pcre | =8.31 | |
Pcre Pcre | =8.32 | |
Pcre Pcre | =8.33 | |
Pcre Pcre | =8.34 | |
Pcre Pcre | =8.35 | |
Pcre Pcre | =8.36 | |
Pcre Pcre | =8.37 | |
Pcre Pcre | =8.38 | |
Pcre Pcre2 | <=10.21 | |
redhat/pcre | <8.39 | 8.39 |
redhat/pcre2 | <10.22 | 10.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.