Vulnerability CVE-2010-4052


Published: 2011-01-13   Modified: 2012-02-13

Description:
Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
GNU libc/regcomp(3) Multiple Vulnerabilities
Maksymilian Arci...
07.01.2011
High
proftpd multiple exploit for VU#912279 (only with GNU libc/regcomp(3))
Maksymilian Arci...
07.01.2011
Med.
MacOSX Safari Firefox Kaspersky RegExp Remote/Local Denial of Service
Maksymilian Arci...
13.03.2014

Type:

CWE-399

(Resource Management Errors)

Vendor: GNU
Product: Glibc 
Version:
2.12.2
2.12.1
2.12.0
2.11.3
2.11.2
2.11.1
2.11
2.10.2
2.10.1
2.10
2.1.9
2.1.3.10
2.1.3
2.1.2
2.1.1.6
2.1.1
1.09.1
1.09
1.08
1.07
1.06
1.05
1.04
1.03
1.02
1.01
1.00

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

 References:
http://www.kb.cert.org/vuls/id/912279
http://cxib.net/stuff/proftpd.gnu.c
https://bugzilla.redhat.com/show_bug.cgi?id=645859
http://www.securityfocus.com/bid/45233
http://www.securityfocus.com/archive/1/archive/1/515589/100/0/threaded
http://www.exploit-db.com/exploits/15935
http://securitytracker.com/id?1024832
http://securityreason.com/securityalert/8003
http://securityreason.com/achievement_securityalert/93
http://secunia.com/advisories/42547
http://seclists.org/fulldisclosure/2011/Jan/78

Related CVE
CVE-2018-11237
An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
CVE-2018-11236
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer over...
CVE-2017-18269
An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range sp...
CVE-2018-10535
The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" va...
CVE-2018-10534
The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the valu...
CVE-2018-10373
concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file...
CVE-2018-10372
process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.
CVE-2018-9996
An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_...

Copyright 2018, cxsecurity.com

 

Back to Top