The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
Cite this page
CVE-2015-8382. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2015-8382
Use CWE-119, Pcre vendor hub and Perl Compatible Regular Expression Library product page to widen CVE-2015-8382 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2015-8394, CVE-2015-8390 and CVE-2015-8389 for nearby disclosures in the same product family.