Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0242

Опубликовано: 29 янв. 2013
Источник: redhat
CVSS2: 4.3

Описание

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

A flaw was found in the regular expression matching routines that process multibyte character input. If an application utilized the glibc regular expression matching mechanism, an attacker could provide specially-crafted input that, when processed, would cause the application to crash.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=905874glibc: Buffer overrun (DoS) in regexp matcher by processing multibyte characters

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

nvd
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

debian
больше 12 лет назад

Buffer overflow in the extend_buffers function in the regular expressi ...

github
больше 3 лет назад

Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

oracle-oval
больше 12 лет назад

ELSA-2013-0769: glibc security and bug fix update (LOW)

4.3 Medium

CVSS2