Critical severity9.8NVD Advisory· Published Jan 3, 2016· Updated May 6, 2026
CVE-2016-1283
CVE-2016-1283
Description
The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
Affected products
5cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- bugs.exim.org/show_bug.cginvdExploitIssue TrackingPermissions RequiredThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2016-March/178193.htmlnvdMailing ListThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2016-March/178955.htmlnvdMailing ListThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/79825nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034555nvdBroken LinkThird Party AdvisoryVDB Entry
- www.slackware.com/security/viewer.phpnvdThird Party Advisory
- access.redhat.com/errata/RHSA-2016:1132nvdThird Party Advisory
- bto.bluecoat.com/security-advisory/sa128nvdPermissions RequiredThird Party Advisory
- security.gentoo.org/glsa/201607-02nvdThird Party Advisory
- www.tenable.com/security/tns-2016-18nvdThird Party Advisory
- www.tenable.com/security/tns-2017-14nvdThird Party Advisory
News mentions
0No linked articles in our index yet.