CVE-2015-3210

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pcre:pcre2:10.10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*
cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*

History

20 Dec 2023, 18:28

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2750.html - () http://rhn.redhat.com/errata/RHSA-2016-2750.html - Third Party Advisory
References () http://www.securityfocus.com/bid/74934 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/74934 - Broken Link, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2016:1132 - () https://access.redhat.com/errata/RHSA-2016:1132 - Third Party Advisory
CWE CWE-119 CWE-787

Information

Published : 2016-12-13 16:59

Updated : 2023-12-20 18:28


NVD link : CVE-2015-3210

Mitre link : CVE-2015-3210

CVE.ORG link : CVE-2015-3210


JSON object : View

Products Affected

pcre

  • pcre2
  • pcre
CWE
CWE-787

Out-of-bounds Write