{"id":"CVE-2015-2326","details":"The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by \"((?+1)(\\1))/\".","modified":"2026-02-05T03:24:34.913298Z","published":"2020-01-14T17:15:12Z","related":["SUSE-SU-2015:1273-1","openSUSE-SU-2024:10277-1","openSUSE-SU-2024:10290-1","openSUSE-SU-2024:10344-1","openSUSE-SU-2024:10447-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html"},{"type":"ADVISORY","url":"https://bugs.exim.org/show_bug.cgi?id=1592"},{"type":"ADVISORY","url":"https://fortiguard.com/zeroday/FG-VD-15-016"},{"type":"ADVISORY","url":"https://www.pcre.org/original/changelog.txt"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html"},{"type":"EVIDENCE","url":"https://bugs.exim.org/show_bug.cgi?id=1592"},{"type":"REPORT","url":"https://bugs.exim.org/show_bug.cgi?id=1592"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}