CVE-2015-8380 PUBLISHED

The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

EPSS 1.24% · 79.1th percentile

Risk Scores

EPSS Score
1.24%
79.1th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSpcre30, 1:8.31-2, 1:8.31-2ubuntu2

Timeline

References

Open in Interactive Console →