Lucene search

K
nvd[email protected]NVD:CVE-2010-4051
HistoryJan 13, 2011 - 7:00 p.m.

CVE-2010-4051

2011-01-1319:00:02
web.nvd.nist.gov
5

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

7.3

Confidence

High

EPSS

0.018

Percentile

88.3%

The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a “RE_DUP_MAX overflow.”

Affected configurations

NVD
Node
gnuglibcMatch1.00
OR
gnuglibcMatch1.01
OR
gnuglibcMatch1.02
OR
gnuglibcMatch1.03
OR
gnuglibcMatch1.04
OR
gnuglibcMatch1.05
OR
gnuglibcMatch1.06
OR
gnuglibcMatch1.07
OR
gnuglibcMatch1.08
OR
gnuglibcMatch1.09
OR
gnuglibcMatch1.09.1
OR
gnuglibcMatch2.1
OR
gnuglibcMatch2.1.1
OR
gnuglibcMatch2.1.1.6
OR
gnuglibcMatch2.1.2
OR
gnuglibcMatch2.1.3
OR
gnuglibcMatch2.1.3.10
OR
gnuglibcMatch2.1.9
OR
gnuglibcMatch2.10
OR
gnuglibcMatch2.10.1
OR
gnuglibcMatch2.10.2
OR
gnuglibcMatch2.11
OR
gnuglibcMatch2.11.1
OR
gnuglibcMatch2.11.2
OR
gnuglibcMatch2.11.3
OR
gnuglibcMatch2.12.0
OR
gnuglibcMatch2.12.1
OR
gnuglibcMatch2.12.2

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

7.3

Confidence

High

EPSS

0.018

Percentile

88.3%