7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.067 Low
EPSS
Percentile
93.9%
The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | pcre2 | < 10.42-1 | pcre2_10.42-1_all.deb |
Debian | 11 | all | pcre2 | < 10.36-2+deb11u1 | pcre2_10.36-2+deb11u1_all.deb |
Debian | 999 | all | pcre2 | < 10.42-4 | pcre2_10.42-4_all.deb |
Debian | 13 | all | pcre2 | < 10.42-4 | pcre2_10.42-4_all.deb |
Debian | 12 | all | pcre3 | < 2:8.38-1 | pcre3_2:8.38-1_all.deb |
Debian | 11 | all | pcre3 | < 2:8.38-1 | pcre3_2:8.38-1_all.deb |
Debian | 999 | all | pcre3 | < 2:8.38-1 | pcre3_2:8.38-1_all.deb |
Debian | 13 | all | pcre3 | < 2:8.38-1 | pcre3_2:8.38-1_all.deb |