PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2015/11/29/1 | third party advisory mailing list |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | third party advisory |
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 | |
http://rhn.redhat.com/errata/RHSA-2016-1025.html | vendor advisory |
http://www.securityfocus.com/bid/74924 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor advisory |
http://www.fortiguard.com/advisory/FG-VD-15-014/ | third party advisory |
https://jira.mongodb.org/browse/SERVER-17252 | third party advisory |
https://bugs.exim.org/show_bug.cgi?id=1515 | exploit |
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup | exploit |