WID-SEC-W-2022-0523
Vulnerability from csaf_certbund - Published: 2022-05-12 22:00 - Updated: 2023-03-15 23:00In PCRE2 (Perl Compatible Regular Expressions) existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund von mehreren Out-of-Bound-Reads in den Funktionen "compile_xclass_matchingpath()" und "get_recurse_data_length()" der Datei "pcre2_jit_compile.c". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
In PCRE2 (Perl Compatible Regular Expressions) existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund von mehreren Out-of-Bound-Reads in den Funktionen "compile_xclass_matchingpath()" und "get_recurse_data_length()" der Datei "pcre2_jit_compile.c". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen.
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Perl Compatible Regular Expressions (PCRE) ist eine Programmbibliothek zur Auswertung und Anwendung von regul\u00e4ren Ausdr\u00fccken.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in PCRE2 (Perl Compatible Regular Expressions) ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0523 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0523.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0523 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0523"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3363 vom 2023-03-16",
"url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6958506 vom 2023-02-27",
"url": "https://www.ibm.com/support/pages/node/6958506"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-071 vom 2022-05-20",
"url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1836-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011157.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1883-1 vom 2022-05-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011183.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2022-05-12",
"url": "https://access.redhat.com/security/cve/CVE-2022-1586"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2022-05-12",
"url": "https://access.redhat.com/security/cve/CVE-2022-1587"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5251 vom 2022-07-01",
"url": "https://access.redhat.com/errata/RHSA-2022:5251"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-5251 vom 2022-07-01",
"url": "http://linux.oracle.com/errata/ELSA-2022-5251.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2334-1 vom 2022-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011480.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2360-1 vom 2022-07-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2361-1 vom 2022-07-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011510.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2565-1 vom 2022-07-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011678.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2566-1 vom 2022-07-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011681.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-5809 vom 2022-08-03",
"url": "http://linux.oracle.com/errata/ELSA-2022-5809.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2649-1 vom 2022-08-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011755.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5809 vom 2022-08-03",
"url": "https://access.redhat.com/errata/RHSA-2022:5809"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2022-112 vom 2022-08-10",
"url": "https://downloads.avaya.com/css/P8/documents/101083160"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6188 vom 2022-08-25",
"url": "https://access.redhat.com/errata/RHSA-2022:6188"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6184 vom 2022-08-25",
"url": "https://access.redhat.com/errata/RHSA-2022:6184"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6183 vom 2022-09-06",
"url": "https://access.redhat.com/errata/RHSA-2022:6183"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6182 vom 2022-09-06",
"url": "https://access.redhat.com/errata/RHSA-2022:6182"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5627-1 vom 2022-09-22",
"url": "https://ubuntu.com/security/notices/USN-5627-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7058 vom 2022-10-20",
"url": "https://access.redhat.com/errata/RHSA-2022:7058"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:7055 vom 2022-10-19",
"url": "https://access.redhat.com/errata/RHSA-2022:7055"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20221028-0009 vom 2022-10-28",
"url": "https://security.netapp.com/advisory/ntap-20221028-0009/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-191 vom 2022-11-04",
"url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-191.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1871 vom 2022-11-09",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1871.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08",
"url": "https://access.redhat.com/errata/RHSA-2022:8781"
}
],
"source_lang": "en-US",
"title": "PCRE2: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2023-03-15T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:29:49.366+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0523",
"initial_release_date": "2022-05-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-05-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-05-19T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-05-26T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-30T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-07-03T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-07-10T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-07-12T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-07-27T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-08-02T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-08-03T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2022-08-11T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2022-08-25T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-09-06T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-09-22T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-19T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-10-30T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2022-11-06T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-11-09T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-12-07T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-02-27T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-03-15T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "22"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Application Enablement Services",
"product": {
"name": "Avaya Aura Application Enablement Services",
"product_id": "T015516",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_application_enablement_services:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Device Services",
"product": {
"name": "Avaya Aura Device Services",
"product_id": "T015517",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_device_services:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM 7.5",
"product": {
"name": "IBM QRadar SIEM 7.5",
"product_id": "T022954",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5"
}
}
},
{
"category": "product_name",
"name": "IBM QRadar SIEM 7.4",
"product": {
"name": "IBM QRadar SIEM 7.4",
"product_id": "T025626",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.4"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T016960",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source PCRE (Perl Compatible Regular Expressions) 2",
"product": {
"name": "Open Source PCRE (Perl Compatible Regular Expressions) 2",
"product_id": "T023212",
"product_identification_helper": {
"cpe": "cpe:/a:pcre:perl_compatible_regular_expression_library:2"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat OpenShift",
"product": {
"name": "Red Hat OpenShift",
"product_id": "T008027",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In PCRE2 (Perl Compatible Regular Expressions) existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund von mehreren Out-of-Bound-Reads in den Funktionen \"compile_xclass_matchingpath()\" und \"get_recurse_data_length()\" der Datei \"pcre2_jit_compile.c\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"T015519",
"T008027",
"T015518",
"T015517",
"67646",
"T015516",
"T015127",
"T015126",
"T004914",
"T016960",
"T022954",
"T015361",
"2951",
"T002207",
"T000126",
"T025626",
"398363",
"T023212"
]
},
"release_date": "2022-05-12T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In PCRE2 (Perl Compatible Regular Expressions) existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund von mehreren Out-of-Bound-Reads in den Funktionen \"compile_xclass_matchingpath()\" und \"get_recurse_data_length()\" der Datei \"pcre2_jit_compile.c\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"T015519",
"T008027",
"T015518",
"T015517",
"67646",
"T015516",
"T015127",
"T015126",
"T004914",
"T016960",
"T022954",
"T015361",
"2951",
"T002207",
"T000126",
"T025626",
"398363",
"T023212"
]
},
"release_date": "2022-05-12T22:00:00.000+00:00",
"title": "CVE-2022-1587"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.