CVE-2015-2325

The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html Mailing List Third Party Advisory
https://bugs.exim.org/show_bug.cgi?id=1591 Exploit Issue Tracking Permissions Required Third Party Advisory
https://fortiguard.com/zeroday/FG-VD-15-015 Third Party Advisory
https://www.pcre.org/original/changelog.txt Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pcre:pcre:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

05 Aug 2022, 14:29

Type Values Removed Values Added
CPE cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

18 Jul 2022, 17:48

Type Values Removed Values Added
References (CONFIRM) https://www.pcre.org/original/changelog.txt - Release Notes (CONFIRM) https://www.pcre.org/original/changelog.txt - Release Notes, Vendor Advisory
References (MISC) https://bugs.exim.org/show_bug.cgi?id=1591 - Exploit, Issue Tracking, Third Party Advisory (MISC) https://bugs.exim.org/show_bug.cgi?id=1591 - Exploit, Issue Tracking, Permissions Required, Third Party Advisory
CPE cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Information

Published : 2020-01-14 17:15

Updated : 2024-02-04 20:39


NVD link : CVE-2015-2325

Mitre link : CVE-2015-2325

CVE.ORG link : CVE-2015-2325


JSON object : View

Products Affected

php

  • php

mariadb

  • mariadb

pcre

  • pcre

opensuse

  • opensuse
CWE
CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write