The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html | third party advisory mailing list |
https://bugs.exim.org/show_bug.cgi?id=1591 | issue tracking permissions required exploit third party advisory |
https://www.pcre.org/original/changelog.txt | release notes vendor advisory |
https://fortiguard.com/zeroday/FG-VD-15-015 | third party advisory |