CVE-2015-3210

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pcre:pcre2:10.10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*

History

20 Dec 2023, 18:28

Type Values Removed Values Added
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2750.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2750.html - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2016:1132 - (REDHAT) https://access.redhat.com/errata/RHSA-2016:1132 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/74934 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/74934 - Broken Link, Third Party Advisory, VDB Entry
CWE CWE-119 CWE-787

Information

Published : 2016-12-13 16:59

Updated : 2024-02-28 15:44


NVD link : CVE-2015-3210

Mitre link : CVE-2015-3210

CVE.ORG link : CVE-2015-3210


JSON object : View

Products Affected

pcre

  • pcre
  • pcre2
CWE
CWE-787

Out-of-bounds Write