The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
Cite this page
CVE-2016-3191. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2016-3191
Use CWE-119, Pcre vendor hub and Pcre product page to widen CVE-2016-3191 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2015-5073, CVE-2015-2325 and CVE-2017-7246 for nearby disclosures in the same product family.