Vulnerability Name:

CVE-2015-3217

Assigned:2015-06-03
Published:2015-06-03
Updated:2018-05-17
Summary:PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
CVSS v3 Severity:7.5 High (CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.3 High (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
4.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
References:Source: REDHAT
Type: UNKNOWN
RHSA-2016:1025

Source: REDHAT
Type: UNKNOWN
RHSA-2016:2750

Source: CONFIRM
Type: PATCH
http://vcs.pcre.org/pcre?view=revision&revision=1566

Source: CONFIRM
Type: VENDOR_ADVISORY
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886

Source: MLIST
Type: UNKNOWN
[oss-security] 20150603 CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match()

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

Source: BID
Type: VENDOR_ADVISORY
75018

Source: REDHAT
Type: UNKNOWN
RHSA-2016:1132

Source: CONFIRM
Type: VENDOR_ADVISORY
https://bugs.exim.org/show_bug.cgi?id=1638

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1228283

Source: XF
Type: UNKNOWN
pcre-cve20153217-bo(103582)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:pcre:pcre2:10.10:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:pcre:pcre:7.8:*:*:*:*:*:*:*
  • OR cpe:/a:pcre:pcre:8.32:*:*:*:*:*:*:*
  • OR cpe:/a:pcre:pcre:8.33:*:*:*:*:*:*:*
  • OR cpe:/a:pcre:pcre:8.34:*:*:*:*:*:*:*
  • OR cpe:/a:pcre:pcre:8.35:*:*:*:*:*:*:*
  • OR cpe:/a:pcre:pcre:8.36:*:*:*:*:*:*:*
  • OR cpe:/a:pcre:pcre:8.37:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20153217
    V
    CVE-2015-3217
    2018-05-25
    oval:com.ubuntu.precise:def:20153217000
    V
    CVE-2015-3217 on Ubuntu 12.04 LTS (precise) - medium.
    2016-12-13
    oval:com.ubuntu.trusty:def:20153217000
    V
    CVE-2015-3217 on Ubuntu 14.04 LTS (trusty) - medium.
    2016-12-13
    oval:com.redhat.rhsa:def:20161025
    P
    RHSA-2016:1025: pcre security update (Important)
    2016-05-11
    BACK
    pcre pcre2 10.10
    pcre pcre 7.8
    pcre pcre 8.32
    pcre pcre 8.33
    pcre pcre 8.34
    pcre pcre 8.35
    pcre pcre 8.36
    pcre pcre 8.37
    ibm powerkvm 2.1
    ibm powerkvm 3.1