| Vulnerability Name: | CVE-2017-16231 (CCN-154726) | ||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2017-10-30 | ||||||||||||||||||||||||||||||||||||||||
| Published: | 2018-12-21 | ||||||||||||||||||||||||||||||||||||||||
| Updated: | 2019-04-02 | ||||||||||||||||||||||||||||||||||||||||
| Summary: | ** DISPUTED ** In PCRE 8.41, after compiling, a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive call. Note: third parties dispute the relevance of this report, noting that there are options that can be used to limit the amount of stack that is used. | ||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-16231 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html Source: MISC Type: Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2018/Dec/33 Source: MISC Type: Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2017/11/01/11 Source: MISC Type: Exploit, Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2017/11/01/3 Source: MISC Type: Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2017/11/01/7 Source: MISC Type: Exploit, Mailing List, Third Party Advisory http://www.openwall.com/lists/oss-security/2017/11/01/8 Source: MISC Type: Third Party Advisory, VDB Entry http://www.securityfocus.com/bid/101688 Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugs.exim.org/show_bug.cgi?id=2047 Source: XF Type: UNKNOWN pcre-cve201716231-dos(154726) Source: CCN Type: Packet Storm Security [12-21-2018] PCRE 8.41 Buffer Overflow Source: CCN Type: SourceForge PCRE Project Web page PCRE Source: CCN Type: IBM Security Bulletin 1136692 (MQ Appliance) IBM MQ Appliance is affected by a PCRE vulnerability (CVE-2017-16231) Source: CCN Type: IBM Security Bulletin 6091024 (DataPower Gateway) IBM DataPower Gateway is potentially vulnerable to a DoS issue when processing regular expressions (CVE-2017-16231) Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-16231 | ||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||