{"id":"CVE-2017-7186","details":"libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.","modified":"2026-04-16T01:45:09.582767425Z","published":"2017-03-20T00:59:00.190Z","related":["SUSE-SU-2021:3652-1","openSUSE-SU-2024:11153-1","openSUSE-SU-2024:11154-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:pcre:pcre:8.40:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.40"}]}]},"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/97030"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"type":"ADVISORY","url":"https://bugs.exim.org/show_bug.cgi?id=2052"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-09"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-25"},{"type":"FIX","url":"https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/"},{"type":"FIX","url":"https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date"},{"type":"FIX","url":"https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date"},{"type":"FIX","url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date"},{"type":"FIX","url":"https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pcre2project/pcre2","events":[{"introduced":"0"},{"last_affected":"08f2a603e8ab886d1074f6ebab787f0ab05f1c2e"}],"database_specific":{"cpe":"cpe:2.3:a:pcre:pcre2:10.23:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"10.23"}]}}],"versions":["pcre2-10.23"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-7186.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}