Critical severity9.8NVD Advisory· Published Dec 13, 2016· Updated May 6, 2026
CVE-2015-3210
CVE-2015-3210
Description
Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
Affected products
5Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- bugs.exim.org/show_bug.cginvdExploitIssue TrackingVendor Advisory
- rhn.redhat.com/errata/RHSA-2016-2750.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/74934nvdBroken LinkThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2016:1132nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2015/06/01/7nvdMailing List
- www.openwall.com/lists/oss-security/2015/12/02/11nvdMailing List
News mentions
0No linked articles in our index yet.