First published: Fri Feb 08 2013(Updated: )
Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library | =2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0242 has a high severity rating as it can lead to denial of service through memory corruption and application crashes.
To fix CVE-2013-0242, update GLIBC to a version later than 2.17 that has addressed this vulnerability.
CVE-2013-0242 primarily affects GNU C Library versions 2.17 and earlier.
The impact of CVE-2013-0242 includes potential denial of service due to application crashes when processing crafted multibyte characters.
Yes, CVE-2013-0242 can be exploited remotely through crafted input by attackers, allowing for denial of service.