Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2015-5073

Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.3%
CVSS Severity
CVSS v3 Score 9.1
CVSS v2 Score 6.4
References
Products affected by CVE-2015-5073
  • Ibm » Powerkvm » Version: 2.1
    cpe:2.3:a:ibm:powerkvm:2.1
  • Ibm » Powerkvm » Version: 3.1
    cpe:2.3:a:ibm:powerkvm:3.1
  • Pcre » Pcre » Version: 1.00
    cpe:2.3:a:pcre:pcre:1.00
  • Pcre » Pcre » Version: 1.01
    cpe:2.3:a:pcre:pcre:1.01
  • Pcre » Pcre » Version: 1.02
    cpe:2.3:a:pcre:pcre:1.02
  • Pcre » Pcre » Version: 1.03
    cpe:2.3:a:pcre:pcre:1.03
  • Pcre » Pcre » Version: 1.04
    cpe:2.3:a:pcre:pcre:1.04
  • Pcre » Pcre » Version: 1.05
    cpe:2.3:a:pcre:pcre:1.05
  • Pcre » Pcre » Version: 1.06
    cpe:2.3:a:pcre:pcre:1.06
  • Pcre » Pcre » Version: 1.07
    cpe:2.3:a:pcre:pcre:1.07
  • Pcre » Pcre » Version: 1.08
    cpe:2.3:a:pcre:pcre:1.08
  • Pcre » Pcre » Version: 1.09
    cpe:2.3:a:pcre:pcre:1.09
  • Pcre » Pcre » Version: 2.00
    cpe:2.3:a:pcre:pcre:2.00
  • Pcre » Pcre » Version: 2.01
    cpe:2.3:a:pcre:pcre:2.01
  • Pcre » Pcre » Version: 2.02
    cpe:2.3:a:pcre:pcre:2.02
  • Pcre » Pcre » Version: 2.03
    cpe:2.3:a:pcre:pcre:2.03
  • Pcre » Pcre » Version: 2.04
    cpe:2.3:a:pcre:pcre:2.04
  • Pcre » Pcre » Version: 2.05
    cpe:2.3:a:pcre:pcre:2.05
  • Pcre » Pcre » Version: 2.06
    cpe:2.3:a:pcre:pcre:2.06
  • Pcre » Pcre » Version: 2.07
    cpe:2.3:a:pcre:pcre:2.07
  • Pcre » Pcre » Version: 2.08
    cpe:2.3:a:pcre:pcre:2.08
  • Pcre » Pcre » Version: 2.08a
    cpe:2.3:a:pcre:pcre:2.08a
  • Pcre » Pcre » Version: 3.0
    cpe:2.3:a:pcre:pcre:3.0
  • Pcre » Pcre » Version: 3.1
    cpe:2.3:a:pcre:pcre:3.1
  • Pcre » Pcre » Version: 3.2
    cpe:2.3:a:pcre:pcre:3.2
  • Pcre » Pcre » Version: 3.3
    cpe:2.3:a:pcre:pcre:3.3
  • Pcre » Pcre » Version: 3.4
    cpe:2.3:a:pcre:pcre:3.4
  • Pcre » Pcre » Version: 3.5
    cpe:2.3:a:pcre:pcre:3.5
  • Pcre » Pcre » Version: 3.6
    cpe:2.3:a:pcre:pcre:3.6
  • Pcre » Pcre » Version: 3.7
    cpe:2.3:a:pcre:pcre:3.7
  • Pcre » Pcre » Version: 3.8
    cpe:2.3:a:pcre:pcre:3.8
  • Pcre » Pcre » Version: 3.9
    cpe:2.3:a:pcre:pcre:3.9
  • Pcre » Pcre » Version: 4.0
    cpe:2.3:a:pcre:pcre:4.0
  • Pcre » Pcre » Version: 4.1
    cpe:2.3:a:pcre:pcre:4.1
  • Pcre » Pcre » Version: 4.2
    cpe:2.3:a:pcre:pcre:4.2
  • Pcre » Pcre » Version: 4.3
    cpe:2.3:a:pcre:pcre:4.3
  • Pcre » Pcre » Version: 4.4
    cpe:2.3:a:pcre:pcre:4.4
  • Pcre » Pcre » Version: 4.5
    cpe:2.3:a:pcre:pcre:4.5
  • Pcre » Pcre » Version: 5.0
    cpe:2.3:a:pcre:pcre:5.0
  • Pcre » Pcre » Version: 6.0
    cpe:2.3:a:pcre:pcre:6.0
  • Pcre » Pcre » Version: 6.1
    cpe:2.3:a:pcre:pcre:6.1
  • Pcre » Pcre » Version: 6.2
    cpe:2.3:a:pcre:pcre:6.2
  • Pcre » Pcre » Version: 6.3
    cpe:2.3:a:pcre:pcre:6.3
  • Pcre » Pcre » Version: 6.4
    cpe:2.3:a:pcre:pcre:6.4
  • Pcre » Pcre » Version: 6.5
    cpe:2.3:a:pcre:pcre:6.5
  • Pcre » Pcre » Version: 6.6
    cpe:2.3:a:pcre:pcre:6.6
  • Pcre » Pcre » Version: 6.7
    cpe:2.3:a:pcre:pcre:6.7
  • Pcre » Pcre » Version: 7.0
    cpe:2.3:a:pcre:pcre:7.0
  • Pcre » Pcre » Version: 7.1
    cpe:2.3:a:pcre:pcre:7.1
  • Pcre » Pcre » Version: 7.2
    cpe:2.3:a:pcre:pcre:7.2
  • Pcre » Pcre » Version: 7.3
    cpe:2.3:a:pcre:pcre:7.3
  • Pcre » Pcre » Version: 7.4
    cpe:2.3:a:pcre:pcre:7.4
  • Pcre » Pcre » Version: 7.5
    cpe:2.3:a:pcre:pcre:7.5
  • Pcre » Pcre » Version: 7.6
    cpe:2.3:a:pcre:pcre:7.6
  • Pcre » Pcre » Version: 7.7
    cpe:2.3:a:pcre:pcre:7.7
  • Pcre » Pcre » Version: 7.8
    cpe:2.3:a:pcre:pcre:7.8
  • Pcre » Pcre » Version: 7.9
    cpe:2.3:a:pcre:pcre:7.9
  • Pcre » Pcre » Version: 8.00
    cpe:2.3:a:pcre:pcre:8.00
  • Pcre » Pcre » Version: 8.01
    cpe:2.3:a:pcre:pcre:8.01
  • Pcre » Pcre » Version: 8.02
    cpe:2.3:a:pcre:pcre:8.02
  • Pcre » Pcre » Version: 8.10
    cpe:2.3:a:pcre:pcre:8.10
  • Pcre » Pcre » Version: 8.11
    cpe:2.3:a:pcre:pcre:8.11
  • Pcre » Pcre » Version: 8.12
    cpe:2.3:a:pcre:pcre:8.12
  • Pcre » Pcre » Version: 8.13
    cpe:2.3:a:pcre:pcre:8.13
  • Pcre » Pcre » Version: 8.20
    cpe:2.3:a:pcre:pcre:8.20
  • Pcre » Pcre » Version: 8.21
    cpe:2.3:a:pcre:pcre:8.21
  • Pcre » Pcre » Version: 8.30
    cpe:2.3:a:pcre:pcre:8.30
  • Pcre » Pcre » Version: 8.31
    cpe:2.3:a:pcre:pcre:8.31
  • Pcre » Pcre » Version: 8.32
    cpe:2.3:a:pcre:pcre:8.32
  • Pcre » Pcre » Version: 8.33
    cpe:2.3:a:pcre:pcre:8.33
  • Pcre » Pcre » Version: 8.34
    cpe:2.3:a:pcre:pcre:8.34
  • Pcre » Pcre » Version: 8.35
    cpe:2.3:a:pcre:pcre:8.35
  • Pcre » Pcre » Version: 8.36
    cpe:2.3:a:pcre:pcre:8.36
  • Pcre » Pcre » Version: 8.37
    cpe:2.3:a:pcre:pcre:8.37


Contact Us

Shodan ® - All rights reserved