CPANSA-Perl6-Pugs-2015-8382-libpcre: Perl6-Pugs vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2015-12-02T00:00:00 Engine CSAF Perl Toolkit 0.26
Current release date 2015-12-02T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score Severity
Original language Language en
Also referred to

Vulnerability Description

The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.

Vulnerabilities

CVE-2015-8382

Vulnerability Description

The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.

Weakness CWE-119 : Improper Restriction of Operations within the Bounds of a Memory Buffer

Product status

Known affected
Product Score
Perl6-Pugs greater than or equal 6.0.12 and less than or equal 6.2.9
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
2.0 AV:N/AC:L/Au:N/C:P/I:N/A:P 6.4 Medium

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Wed Dec 2 00:00:00 2015 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/