CVE-2016-3191

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:49

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-1025.html - () http://rhn.redhat.com/errata/RHSA-2016-1025.html -
References () http://vcs.pcre.org/pcre2?view=revision&revision=489 - () http://vcs.pcre.org/pcre2?view=revision&revision=489 -
References () http://vcs.pcre.org/pcre?view=revision&revision=1631 - () http://vcs.pcre.org/pcre?view=revision&revision=1631 -
References () http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 - () http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 -
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html -
References () http://www.securityfocus.com/bid/84810 - () http://www.securityfocus.com/bid/84810 -
References () https://access.redhat.com/errata/RHSA-2016:1132 - () https://access.redhat.com/errata/RHSA-2016:1132 -
References () https://bto.bluecoat.com/security-advisory/sa128 - () https://bto.bluecoat.com/security-advisory/sa128 -
References () https://bugs.debian.org/815920 - () https://bugs.debian.org/815920 -
References () https://bugs.debian.org/815921 - () https://bugs.debian.org/815921 -
References () https://bugs.exim.org/show_bug.cgi?id=1791 - Exploit () https://bugs.exim.org/show_bug.cgi?id=1791 - Exploit
References () https://bugzilla.redhat.com/show_bug.cgi?id=1311503 - () https://bugzilla.redhat.com/show_bug.cgi?id=1311503 -
References () https://www.tenable.com/security/tns-2016-18 - () https://www.tenable.com/security/tns-2016-18 -

Information

Published : 2016-03-17 23:59

Updated : 2024-11-21 02:49


NVD link : CVE-2016-3191

Mitre link : CVE-2016-3191

CVE.ORG link : CVE-2016-3191


JSON object : View

Products Affected

pcre

  • pcre
  • pcre2
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer