CVE-2016-3191
17.03.2016, 23:59
The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.Enginsight
Vendor | Product | Version |
---|---|---|
pcre | pcre | 8.00 |
pcre | pcre | 8.01 |
pcre | pcre | 8.02 |
pcre | pcre | 8.10 |
pcre | pcre | 8.11 |
pcre | pcre | 8.12 |
pcre | pcre | 8.13 |
pcre | pcre | 8.20 |
pcre | pcre | 8.21 |
pcre | pcre | 8.30 |
pcre | pcre | 8.31 |
pcre | pcre | 8.32 |
pcre | pcre | 8.33 |
pcre | pcre | 8.34 |
pcre | pcre | 8.35 |
pcre | pcre | 8.36 |
pcre | pcre | 8.37 |
pcre | pcre | 8.38 |
pcre | pcre2 | 𝑥 ≤ 10.21 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
pcre2 |
| ||||||||||||||||||
pcre3 |
|
Common Weakness Enumeration
References