[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-0242Date: (C)2013-02-08   (M)2023-12-22


Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECTRACK-1028063
SECUNIA-51951
SECUNIA-55113
BID-57638
OSVDB-89747
GLSA-201503-04
MDVSA-2013:163
RHSA-2013:0769
RHSA-2013:1605
USN-1991-1
http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html
http://www.openwall.com/lists/oss-security/2013/01/30/5
glibc-extendbuffers-dos(81707)
http://sourceware.org/bugzilla/show_bug.cgi?id=15078
http://www.vmware.com/security/advisories/VMSA-2014-0008.html

CPE    1
cpe:/a:gnu:glibc:2.17
CWE    1
CWE-119
OVAL    12
oval:org.secpod.oval:def:202809
oval:org.secpod.oval:def:104790
oval:org.secpod.oval:def:1300194
oval:org.secpod.oval:def:1500160
...

© SecPod Technologies