Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) up to and including 2.11.3, and 2.12.x up to and including 2.12.2, allows context-dependent malicious users to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu glibc 1.00 |
||
gnu glibc 1.01 |
||
gnu glibc 1.07 |
||
gnu glibc 1.06 |
||
gnu glibc 2.1.3.10 |
||
gnu glibc 2.1.9 |
||
gnu glibc 2.11.3 |
||
gnu glibc 2.12.2 |
||
gnu glibc 1.09.1 |
||
gnu glibc 1.09 |
||
gnu glibc 1.08 |
||
gnu glibc 2.1.2 |
||
gnu glibc 2.1.3 |
||
gnu glibc 2.10 |
||
gnu glibc 2.10.1 |
||
gnu glibc 1.05 |
||
gnu glibc 1.04 |
||
gnu glibc 2.1 |
||
gnu glibc 2.10.2 |
||
gnu glibc 2.12.0 |
||
gnu glibc 2.12.1 |
||
gnu glibc 2.11 |
||
gnu glibc 1.03 |
||
gnu glibc 1.02 |
||
gnu glibc 2.1.1 |
||
gnu glibc 2.1.1.6 |
||
gnu glibc 2.11.1 |
||
gnu glibc 2.11.2 |