The compilebranch function in pcrecompile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:pcre:pcre:8.00:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.00"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.01:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.01"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.02:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.02"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.10:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.10"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.11:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.11"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.12:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.12"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.13:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.13"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.20:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.20"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.21:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.21"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.30:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.30"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.31:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.31"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.32:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.32"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.33:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.33"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.34:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.34"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.35:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.35"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.36:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.36"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.37:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.37"
}
]
},
{
"cpe": "cpe:2.3:a:pcre:pcre:8.38:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.38"
}
]
}
]
}{
"cpe": "cpe:2.3:a:pcre:pcre2:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "10.21"
}
]
}