Description
Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-2694-1 | PCRE vulnerabilities |
Ubuntu USN |
USN-2943-1 | PCRE vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:31.991Z
Reserved: 2015-04-10T00:00:00.000Z
Link: CVE-2015-3210
No data.
Status : Modified
Published: 2016-12-13T16:59:00.187
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-3210
OpenCVE Enrichment
No data.
Ubuntu USN