First published: Fri Oct 22 2010(Updated: )
The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU glibc | =2.1.2 | |
GNU glibc | =2.11 | |
GNU glibc | =2.10.1 | |
GNU glibc | =1.00 | |
GNU glibc | =1.06 | |
GNU glibc | =2.1.1 | |
GNU glibc | =1.02 | |
GNU glibc | =1.07 | |
GNU glibc | =2.12.0 | |
GNU glibc | =2.1.1.6 | |
GNU glibc | =1.04 | |
GNU glibc | =1.01 | |
GNU glibc | =2.1 | |
GNU glibc | =1.09.1 | |
GNU glibc | =2.1.9 | |
GNU glibc | =2.12.1 | |
GNU glibc | =1.09 | |
GNU glibc | =2.10 | |
GNU glibc | =2.11.2 | |
GNU glibc | =1.03 | |
GNU glibc | =2.1.3.10 | |
GNU glibc | =2.11.3 | |
GNU glibc | =1.08 | |
GNU glibc | =2.11.1 | |
GNU glibc | =2.1.3 | |
GNU glibc | =1.05 | |
GNU glibc | =2.12.2 | |
GNU glibc | =2.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.