The compilebranch function in pcrecompile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3191.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.00"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.01"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.02"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.13"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.20"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.21"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.30"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.31"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.32"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.33"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.34"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.36"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.37"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.38"
}
]
}
]