Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-4051

Опубликовано: 13 янв. 2011
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."

РелизСтатусПримечание
dapper

DNE

devel

ignored

hardy

DNE

karmic

ignored

lucid

ignored

maverick

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

ignored

hardy

ignored

karmic

DNE

lucid

DNE

maverick

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 89%
0.04658
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."

nvd
около 15 лет назад

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."

debian
около 15 лет назад

The regcomp implementation in the GNU C Library (aka glibc or libc6) t ...

github
больше 3 лет назад

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."

fstec
около 15 лет назад

Уязвимость библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 89%
0.04658
Низкий

5 Medium

CVSS2