Vulnerability Description
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pcre | Pcre | 8.35 |
Related Weaknesses (CWE)
References
- http://vcs.pcre.org/pcre?view=revision&revision=1475
- http://www.openwall.com/lists/oss-security/2016/03/26/1
- http://www.securityfocus.com/bid/85570
- http://www.securitytracker.com/id/1035424
- https://bugs.debian.org/819050
- https://redmine.openinfosecfoundation.org/issues/1693
- http://vcs.pcre.org/pcre?view=revision&revision=1475
- http://www.openwall.com/lists/oss-security/2016/03/26/1
- http://www.securityfocus.com/bid/85570
- http://www.securitytracker.com/id/1035424
- https://bugs.debian.org/819050
- https://redmine.openinfosecfoundation.org/issues/1693
FAQ
What is CVE-2014-9769?
CVE-2014-9769 is a vulnerability with a CVSS score of 7.3 (HIGH). pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have...
How severe is CVE-2014-9769?
CVE-2014-9769 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9769?
Check the references section above for vendor advisories and patch information. Affected products include: Pcre Pcre.