The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
2016-01-03T00:59:03.287
2025-04-12T10:46:40.837
Deferred
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | pcre | pcre | 8.38 | Yes |
Application | php | php | < 5.6.32 | Yes |
Application | php | php | < 7.0.25 | Yes |
Application | php | php | < 7.1.11 | Yes |
Operating System | fedoraproject | fedora | 22 | Yes |
Operating System | fedoraproject | fedora | 23 | Yes |
Operating System | oracle | solaris | 11.3 | Yes |