The pcrecompile2 function in pcrecompile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'){97)?J)?J)(?'R'(?'R'){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.38"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "22"
}
]
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "23"
}
]
},
{
"cpe": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "11.3"
}
]
}
]
}{
"cpe": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "5.6.0"
},
{
"fixed": "5.6.32"
},
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.25"
},
{
"introduced": "7.1.0"
},
{
"fixed": "7.1.11"
}
]
}