PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2016-12-13 16:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-3217
Mitre link : CVE-2015-3217
CVE.ORG link : CVE-2015-3217
JSON object : View
Products Affected
pcre
- pcre
- pcre2
ibm
- powerkvm
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer