Out-of-Bounds Affecting pcre3 package, versions <2:8.38-3.1
Snyk CVSS
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-PCRE3-345545
- published 3 Jan 2016
- disclosed 3 Jan 2016
Introduced: 3 Jan 2016
CVE-2016-1283 Open this link in a new tabHow to fix?
Upgrade Debian:10
pcre3
to version 2:8.38-3.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream pcre3
package and not the pcre3
package as distributed by Debian:10
.
See How to fix?
for Debian:10
relevant fixed versions and status.
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'){97)?J)?J)(?'R'(?'R'){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
References
- ADVISORY
- CVE Details
- Fedora Security Announcement
- Fedora Security Announcement
- Gentoo Security Advisory
- https://bto.bluecoat.com/security-advisory/sa128
- https://bugs.exim.org/show_bug.cgi?id=1767
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2017-14
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.343110
- Oracle Security Bulletin
- RHSA Security Advisory
- Security Focus
- Security Tracker
- Ubuntu CVE Tracker