Vulnerability CVE-2010-4051


Published: 2011-01-13   Modified: 2011-02-02

Description:
The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."

See advisories in our WLB2 database:
Topic
Author
Date
Med.
GNU libc/regcomp(3) Multiple Vulnerabilities
Maksymilian Arci...
07.01.2011
High
proftpd multiple exploit for VU#912279 (only with GNU libc/regcomp(3))
Maksymilian Arci...
07.01.2011
Med.
MacOSX Safari Firefox Kaspersky RegExp Remote/Local Denial of Service
CXSECURITY
13.03.2014

Type:

CWE-noinfo

Vendor: GNU
Product: Glibc 
Version:
2.12.2
2.12.1
2.12.0
2.11.3
2.11.2
2.11.1
2.11
2.10.2
2.10.1
2.10
2.1.9
2.1.3.10
2.1.3
2.1.2
2.1.1.6
2.1.1
1.09.1
1.09
1.08
1.07
1.06
1.05
1.04
1.03
1.02
1.01
1.00

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
http://www.kb.cert.org/vuls/id/912279
http://cxib.net/stuff/proftpd.gnu.c
https://bugzilla.redhat.com/show_bug.cgi?id=645859
http://www.securityfocus.com/bid/45233
http://www.securityfocus.com/archive/1/archive/1/515589/100/0/threaded
http://www.exploit-db.com/exploits/15935
http://securitytracker.com/id?1024832
http://securityreason.com/securityalert/8003
http://securityreason.com/achievement_securityalert/93
http://secunia.com/advisories/42547
http://seclists.org/fulldisclosure/2011/Jan/78

Related CVE
CVE-2016-7444
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism...
CVE-2016-7098
Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
CVE-2016-6261
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
CVE-2016-6262
idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
CVE-2016-6263
The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
CVE-2015-8948
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
CVE-2016-6893
Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access ...
CVE-2016-7123
Cross-site request forgery (CSRF) vulnerability in the admin web interface in GNU Mailman before 2.1.15 allows remote attackers to hijack the authentication of administrators.

Copyright 2016, cxsecurity.com