PC re compile_branch Stack Buffer Overflow Vulnerability (CVE-2016-3191)
PC re compile_branch Stack Buffer Overflow Vulnerability (CVE-2016-3191)
Release date:
Updated on:
Affected Systems:
PCRE 8.x <8.39
Description:
CVE (CAN) ID: CVE-2016-3191
PCRE is a Perl library, including a perl-Compatible Regular Expression Library.
In some versions of PCRE and PCRE2, The compile_branch and pcre2_compile.c functions in pcre_compile.c handle some modes, including (* ACCEPT) substrings with nested parentheses, this allows remote attackers to execute arbitrary code or cause a denial of service by constructing regular expressions.
<* Source: Shannon
*>
Suggestion:
Vendor patch:
PCRE
----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.pcre.org/
Refer:
Https://bugs.debian.org/815920
Https://bugs.exim.org/show_bug.cgi? Id = 1791
Http://vcs.pcre.org/pcre2? View = revision & revision = 489
Http://vcs.pcre.org/pcre? View = revision & revision = 1631
Https://bugzilla.redhat.com/show_bug.cgi? Id = 1311503
Https://bugs.debian.org/815921
PCRE details: click here
PCRE: click here
This article permanently updates the link address: