Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0242

Опубликовано: 08 фев. 2013
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
eglibcremovedpackage
glibcfixed2.17-2package
eglibcfixed2.13-38+deb7u1wheezypackage

Примечания

  • http://seclists.org/oss-sec/2013/q1/202

EPSS

Процентиль: 85%
0.02704
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

redhat
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

nvd
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

github
больше 3 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

oracle-oval
больше 12 лет назад

ELSA-2013-0769: glibc security and bug fix update (LOW)

EPSS

Процентиль: 85%
0.02704
Низкий