Executive Summary
Summary | |
---|---|
Title | GNU libc regcomp() stack exhaustion denial of service |
Informations | |||
---|---|---|---|
Name | VU#912279 | First vendor Publication | 2010-12-07 |
Vendor | VU-CERT | Last vendor Modification | 2010-12-08 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#912279GNU libc regcomp() stack exhaustion denial of serviceOverviewThe regcomp() function of GNU libc is susceptible to stack exhaustion which may result in a denial of service.I. DescriptionIt is possible to trigger deep recursion which results in stack exhaustion. An example trigger is: grep -E ".*{10,}{10,}{10,}{10,}{10,}"II. ImpactAn attacker may be able to trigger a denial of service in applications that accept regular expressions.III. SolutionWe are currently unaware of a practical solution to this problem.Vendor Information
ReferencesThanks to Maksymilian Arciemowicz for reporting this vulnerability. This document was written by Jared Allar.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/912279 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2010-12-07 | GNU glibc 'regcomp()' Stack Exhaustion Denial Of Service Vulnerability |
2013-02-05 | FreeBSD 9.1 ftpd Remote Denial of Service |
2011-01-07 | GNU libc/regcomp(3) Multiple Vulnerabilities |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70447 | GNU C Library regcomp() Function Regex Adjacent Repetition Operator DoS GNU C Library contains a flaw that may allow a remote denial of service. The issue is triggered when errors in the 'regcomp()' function when processing certain regular expressions, allowing a remote attacker to cause a denial of service by using this function on specially crafted regular expressions. |
70446 | GNU C Library regcomp() Function Regex Bounded Repetition RE_DUP_MAX Limitati... GNU C Library contains a flaw that may allow a remote denial of service. The issue is triggered when errors in the 'regcomp()' function when processing certain regular expressions, allowing a remote attacker to cause a denial of service by using this function on specially crafted regular expressions. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-01-16 | Name : The remote device is missing a vendor-supplied security patch. File : juniper_jsa10612.nasl - Type : ACT_GATHER_INFO |
2011-04-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-5098.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-10-27 09:22:38 |
|