CVE-2015-8391
02.12.2015, 01:59
The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.Enginsight
Vendor | Product | Version |
---|---|---|
pcre | pcre | 𝑥 < 8.38 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_eus | 7.2 |
redhat | enterprise_linux_eus | 7.3 |
redhat | enterprise_linux_eus | 7.4 |
redhat | enterprise_linux_eus | 7.5 |
redhat | enterprise_linux_eus | 7.6 |
redhat | enterprise_linux_eus | 7.7 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.2 |
redhat | enterprise_linux_server_aus | 7.3 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_aus | 7.7 |
redhat | enterprise_linux_server_tus | 7.2 |
redhat | enterprise_linux_server_tus | 7.3 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_server_tus | 7.7 |
redhat | enterprise_linux_workstation | 7.0 |
php | php | 5.5.0 ≤ 𝑥 < 5.5.32 |
php | php | 5.6.0 ≤ 𝑥 < 5.6.18 |
php | php | 7.0.0 ≤ 𝑥 < 7.0.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References