Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-2325

Published: 1 April 2015

The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.

Notes

AuthorNote
tyhicks
Unable to trigger the overflow in Vivid, Utopic, or Trusty.
seth-arnold
seyeongkim reports that he was able to reproduce the issue
on vivid and wily
mdeslaur
valgrind does show an invalid read, even if it doesn't end in
a crash
can't reproduce on precise

was supposed to be fixed in wily (2:8.35-7ubuntu2) but got
reverted in (2:8.35-7ubuntu5) by mistake

CVE-2015-2325_CVE-2015-2326_CVE-2015-3210_CVE-2015-5073.patch
in jessie

Priority

Low

Cvss 3 Severity Score

7.8

Score breakdown

Status

Package Release Status
pcre3
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise Not vulnerable
(8.12-4)
trusty
Released (1:8.31-2ubuntu2.1)
upstream Needed

utopic Ignored
(end of life)
vivid
Released (2:8.35-3.3ubuntu1.1)
wily
Released (2:8.35-7.1ubuntu1.3)
Patches:
upstream: http://vcs.pcre.org/pcre?view=revision&revision=1528

Severity score breakdown

Parameter Value
Base score 7.8
Attack vector Local
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H