pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-9575 pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
Ubuntu USN Ubuntu USN USN-2943-1 PCRE vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00731}

epss

{'score': 0.00934}


cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published:

Updated: 2024-08-06T13:55:04.649Z

Reserved: 2016-03-28T00:00:00

Link: CVE-2014-9769

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-03-28T16:59:00.113

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-9769

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-03-23T00:00:00Z

Links: CVE-2014-9769 - Bugzilla

cve-icon OpenCVE Enrichment

No data.