CVE-2014-9769 REJECTED

pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.

EPSS 0.93% · 76.0th percentile

Risk Scores

EPSS Score
0.93%
76.0th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSpcre30, 1:8.31-2, 1:8.31-2ubuntu2
Ubuntu:16.04:LTSpcre30, 2:8.35-7.1ubuntu1, 2:8.38-1ubuntu1

Timeline

References

Open in Interactive Console →