Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f776-wjgx-67c8

Опубликовано: 05 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

EPSS

Процентиль: 85%
0.02704
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

redhat
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

nvd
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

debian
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expressi ...

oracle-oval
больше 12 лет назад

ELSA-2013-0769: glibc security and bug fix update (LOW)

EPSS

Процентиль: 85%
0.02704
Низкий

Дефекты

CWE-119