VYPR
Unrated severityNVD Advisory· Published Jan 22, 2015· Updated May 6, 2026

CVE-2014-7926

CVE-2014-7926

Description

The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory corruption vulnerability in ICU's regular expression engine, triggered by a zero-length quantifier, allows denial of service or possible code execution via crafted web content.

Vulnerability

The vulnerability resides in the Regular Expressions package of International Components for Unicode (ICU) version 52 before SVN revision 292944. It is triggered by a zero-length quantifier in a regular expression, leading to memory corruption. This affects Google Chrome before 40.0.2214.91, as well as other products using ICU, such as Red Hat Enterprise Linux and Ubuntu. [1][2][3]

Exploitation

An attacker can exploit this by crafting a web page containing a specially crafted regular expression with a zero-length quantifier. If a user visits the page, the browser's renderer process (which uses ICU for regular expression handling) will process the malformed regex, causing memory corruption. No authentication is required; the attacker only needs to trick the user into opening the malicious page. [2]

Impact

Successful exploitation can cause a denial of service via renderer crash. Additionally, the memory corruption may be leveraged to execute arbitrary code with the privileges of the sandboxed render process. [2] The scope is limited to the renderer sandbox, but could potentially lead to further compromise if combined with a sandbox escape.

Mitigation

Google Chrome was fixed in version 40.0.2214.91. [3] Red Hat issued RHSA-2015-0093 for affected products. [1] Ubuntu released USN-2476-1. [2] Users should update to the latest versions. No workaround is available; applying the patch is the only mitigation.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

20

News mentions

0

No linked articles in our index yet.