CVE-2015-8388 PUBLISHED

PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.

EPSS 4.18% · 88.6th percentile

Risk Scores

EPSS Score
4.18%
88.6th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSpcre30, 1:8.31-2, 1:8.31-2ubuntu2

Timeline

References

Open in Interactive Console →