Show plain JSON{"affected_release": [{"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-0:2.3-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-0:5.6.25-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-pear-1:1.9.5-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-0:2.3-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-0:5.6.25-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-pear-1:1.9.5-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}], "bugzilla": {"description": "pcre: buffer overflow caused by recursive back reference by name within certain group (8.38/4)", "id": "1287623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287623"}, "csaw": false, "cvss": {"cvss_base_score": "6.8", "cvss_scoring_vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "status": "verified"}, "cwe": "CWE-122", "details": ["Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384."], "name": "CVE-2015-3210", "package_state": [{"cpe": "cpe:/a:redhat:directory_server:8", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Directory Server 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 5"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "glib2", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "glib2", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "virtuoso-opensource", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1", "fix_state": "Not affected", "package_name": "httpd", "product_name": "Red Hat JBoss Enterprise Web Server 1"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2", "fix_state": "Not affected", "package_name": "httpd", "product_name": "Red Hat JBoss Enterprise Web Server 2"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat JBoss Enterprise Web Server 3"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Not affected", "package_name": "php54-php", "product_name": "Red Hat Software Collections"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Not affected", "package_name": "php55-php", "product_name": "Red Hat Software Collections"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Not affected", "package_name": "rh-mariadb101-mariadb", "product_name": "Red Hat Software Collections"}], "public_date": "2015-11-23T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2015-3210\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-3210"], "threat_severity": "Important"}