CVE-2017-11164
Publication date 11 July 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.
Status
Package | Ubuntu Release | Status |
---|---|---|
pcre3 | 24.10 oracular |
Vulnerable
|
24.04 LTS noble |
Vulnerable
|
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Vulnerable
|
|
18.04 LTS bionic |
Vulnerable
|
|
16.04 LTS xenial | Ignored vendor disputes CVE | |
14.04 LTS trusty |
Vulnerable
|
Notes
sbeattie
reproducer in oss-security posting. to exploit this requires an application take regular expressions as untrusted input (not just the string to match against), which is generally not safe to do with pcre.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |