Critical

CVE-2015-8391 - Buffer Errors vulnerability in Pcre Perl Compatible Regular Expression Library 8.37

Publication: 2015-12-02
Summary

The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

Classification
CWE-119: Buffer Errors

Risk level (CVSS 9)

Critical

9.0

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

  • Pcre Perl Compatible Regular Expression Library 8.37