Stack-based Buffer Overflow in PCRE's compile_branch Function

Stack-based Buffer Overflow in PCRE's compile_branch Function

CVE-2016-3191 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.

Learn more about our Web Application Penetration Testing UK.