PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
2016-12-13T16:59:02.220
2025-04-12T10:46:40.837
Deferred
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | pcre | pcre2 | 10.10 | Yes |
Application | pcre | pcre | 7.8 | Yes |
Application | pcre | pcre | 8.32 | Yes |
Application | pcre | pcre | 8.33 | Yes |
Application | pcre | pcre | 8.34 | Yes |
Application | pcre | pcre | 8.35 | Yes |
Application | pcre | pcre | 8.36 | Yes |
Application | pcre | pcre | 8.37 | Yes |
Application | ibm | powerkvm | 2.1 | Yes |
Application | ibm | powerkvm | 3.1 | Yes |