Show plain JSON{"affected_release": [{"advisory": "RHSA-2016:1025", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "pcre-0:8.32-15.el7_2.1", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2016-05-11T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-0:2.3-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-0:5.6.25-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-pear-1:1.9.5-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-0:2.3-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-0:5.6.25-1.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6", "package": "rh-php56-php-pear-1:1.9.5-4.el6", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:1132", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-mariadb100-mariadb-1:10.0.25-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-05-26T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-0:2.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-0:5.6.25-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}, {"advisory": "RHSA-2016:2750", "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7", "package": "rh-php56-php-pear-1:1.9.5-4.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS", "release_date": "2016-11-15T00:00:00Z"}], "bugzilla": {"description": "pcre: stack overflow caused by mishandled group empty match (8.38/11)", "id": "1228283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228283"}, "csaw": false, "cvss": {"cvss_base_score": "4.3", "cvss_scoring_vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "status": "verified"}, "cwe": "CWE-674", "details": ["PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/."], "name": "CVE-2015-3217", "package_state": [{"cpe": "cpe:/a:redhat:directory_server:8", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Directory Server 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Not affected", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 5"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Will not fix", "package_name": "glib2", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Will not fix", "package_name": "pcre", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Will not fix", "package_name": "glib2", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Will not fix", "package_name": "virtuoso-opensource", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1", "fix_state": "Not affected", "package_name": "httpd", "product_name": "Red Hat JBoss Enterprise Web Server 1"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2", "fix_state": "Not affected", "package_name": "httpd", "product_name": "Red Hat JBoss Enterprise Web Server 2"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3", "fix_state": "Will not fix", "package_name": "pcre", "product_name": "Red Hat JBoss Enterprise Web Server 3"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Will not fix", "package_name": "php54-php", "product_name": "Red Hat Software Collections"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Will not fix", "package_name": "php55-php", "product_name": "Red Hat Software Collections"}, {"cpe": "cpe:/a:redhat:rhel_software_collections:2", "fix_state": "Not affected", "package_name": "rh-mariadb101-mariadb", "product_name": "Red Hat Software Collections"}], "public_date": "2015-06-03T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2015-3217\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-3217"], "threat_severity": "Moderate"}