PCRE Denial of Service Vulnerability (CVE-2015-2328)
Release date:
Updated on:
Affected Systems:
PCRE pcre< = 8.36
Description:
CVE (CAN) ID: CVE-2015-2328
PCRE (Perl Compatible Regular Expressions) is a Perl library, including a perl-Compatible Regular Expression Library.
A heap buffer overflow vulnerability exists in PCRE 8.36 and earlier versions. Using a regular expression constructed, remote attackers can exploit this vulnerability to exhaust stacks and cause DOS.
<* Source: Kai Lu
*>
Suggestion:
Vendor patch:
PCRE
----
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.exim.org/viewvc/pcre? View = revision & revision = 1513
Http://advisories.mageia.org/MGASA-2014-0534.html
Https://bugzilla.redhat.com/show_bug.cgi? Id = 1166147
MongoDB:
Https://www.mongodb.org/about/alerts/
Https://jira.mongodb.org/browse/SERVER-17252
Fortinet:
Http://www.fortiguard.com/advisory/FG-VD-15-010/
Http://www.fortiguard.com/advisory/FG-VD-15-014/
PCRE details: click here
PCRE: click here
This article permanently updates the link address: