First published: Wed Feb 24 2016(Updated: )
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcre | <8.39 | 8.39 |
redhat/pcre2 | <10.22 | 10.22 |
pcre pcre | =8.00 | |
pcre pcre | =8.01 | |
pcre pcre | =8.02 | |
pcre pcre | =8.10 | |
pcre pcre | =8.11 | |
pcre pcre | =8.12 | |
pcre pcre | =8.13 | |
pcre pcre | =8.20 | |
pcre pcre | =8.21 | |
pcre pcre | =8.30 | |
pcre pcre | =8.31 | |
pcre pcre | =8.32 | |
pcre pcre | =8.33 | |
pcre pcre | =8.34 | |
pcre pcre | =8.35 | |
pcre pcre | =8.36 | |
pcre pcre | =8.37 | |
pcre pcre | =8.38 | |
PCRE2 (Perl Compatible Regular Expressions) | <=10.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3191 has a critical severity level, allowing for remote code execution or denial of service attacks.
To fix CVE-2016-3191, update to PCRE version 8.39 or PCRE2 version 10.22 or later.
CVE-2016-3191 affects PCRE versions prior to 8.39 and PCRE2 versions prior to 10.22.
Yes, CVE-2016-3191 can be exploited remotely through specially crafted patterns.
CVE-2016-3191 relates to vulnerabilities in pattern handling, specifically involving the (*ACCEPT) substring.