FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2016-3191

This CVE name corresponds to:

Entered Topic
2016-03-21 pcre -- stack buffer overflow

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2016-3191
Phase Assigned(20160315)

Description

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

References

Source Reference
CONFIRM http://vcs.pcre.org/pcre2?view=revision&revision=489
CONFIRM http://vcs.pcre.org/pcre?view=revision&revision=1631
CONFIRM https://bugs.debian.org/815920
CONFIRM https://bugs.debian.org/815921
CONFIRM https://bugs.exim.org/show_bug.cgi?id=1791
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=1311503