CVE-2015-3210 in PCRE
Summary
Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?Pc)(?Pa(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
Once again VulDB remains the best source for vulnerability data.
Reservation
04/10/2015
Disclosure
12/13/2016
Status
Confirmed
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 75660 | Philip Hazel PCRE Regex memory corruption | 119 | Unproven | Unavailable | CVE-2015-3210 |