The regcomp()
function of GNU libc is susceptible to stack exhaustion which may result in a denial of service.
It is possible to trigger deep recursion which results in stack exhaustion. An example trigger is: grep -E ".*{10,}{10,}{10,}{10,}{10,}"
An attacker may be able to trigger a denial of service in applications that accept regular expressions.
We are currently unaware of a practical solution to this problem.
912279
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: October 22, 2010 Updated: December 07, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 22, 2010 Updated: December 07, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 22, 2010 Updated: December 07, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 22, 2010 Updated: December 07, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 22, 2010 Updated: December 07, 2010
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Maksymilian Arciemowicz for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | CVE-2010-4051, CVE-2010-4052 |
---|---|
Severity Metric: | 0.18 Date Public: |