First published: Wed Mar 02 2011(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2010-4756">CVE-2010-4756</a> to the following vulnerability: Name: <a href="https://access.redhat.com/security/cve/CVE-2010-4756">CVE-2010-4756</a> URL: <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4756">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4756</a> Assigned: 20110302 Reference: <a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a> Reference: <a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a> Reference: <a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a> The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2010-2632">CVE-2010-2632</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of REDHAT-BUG-681681 is categorized as moderate.
REDHAT-BUG-681681 affects the GNU C Library, specifically related to the handling of certain inputs.
You can fix REDHAT-BUG-681681 by applying the latest updates for the GNU C Library provided by your distribution.
A temporary workaround for REDHAT-BUG-681681 may involve restricting access to affected services and applications.
REDHAT-BUG-681681 is classified as a potential input validation vulnerability.