CVE Vulnerabilities

CVE-2017-11164

Uncontrolled Recursion

Published: Jul 11, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.8 HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
3.3 LOW
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Ubuntu
NEGLIGIBLE
root.io logo minimus.io logo echo.ai logo

In PCRE 8.41, the OP_KETRMAX feature in the match function in pcre_exec.c allows stack exhaustion (uncontrolled recursion) when processing a crafted regular expression.

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
PcrePcre8.41 (including)8.41 (including)
Pcre3Ubuntuartful*
Pcre3Ubuntubionic*
Pcre3Ubuntucosmic*
Pcre3Ubuntudevel*
Pcre3Ubuntudisco*
Pcre3Ubuntueoan*
Pcre3Ubuntuesm-apps/noble*
Pcre3Ubuntuesm-infra-legacy/trusty*
Pcre3Ubuntuesm-infra/bionic*
Pcre3Ubuntuesm-infra/focal*
Pcre3Ubuntuesm-infra/xenial*
Pcre3Ubuntufocal*
Pcre3Ubuntugroovy*
Pcre3Ubuntuhirsute*
Pcre3Ubuntuimpish*
Pcre3Ubuntujammy*
Pcre3Ubuntukinetic*
Pcre3Ubuntulunar*
Pcre3Ubuntumantic*
Pcre3Ubuntunoble*
Pcre3Ubuntuoracular*
Pcre3Ubuntuplucky*
Pcre3Ubuntuprecise/esm*
Pcre3Ubuntuquesting*
Pcre3Ubuntutrusty*
Pcre3Ubuntutrusty/esm*
Pcre3Ubuntuupstream*
Pcre3Ubuntuvivid/ubuntu-core*
Pcre3Ubuntuxenial*
Pcre3Ubuntuyakkety*
Pcre3Ubuntuzesty*

Potential Mitigations

References