mailing list archives
CVE Request -- glibc: DoS due to a buffer overrun in regexp matcher by processing multibyte characters
From: Jan Lieskovsky <jlieskov () redhat com>
Date: Wed, 30 Jan 2013 06:40:30 -0500 (EST)
Hello Kurt, Steve, vendors,
a security flaw was found in the regular expression matching
routine of glibc, the GNU libc libraries, processed multibyte
characters input. If an application utilized the glibc's regular
expression matching mechanism, an attacker could provide
a specially-crafted input that, when processed would lead
to that executable crash.
Upstream bug report:
* (from Paolo): Jan 30 11:34:19 <bonzini> iankko: it is a memset(foo, 0, ...) that
overruns the buffer, so it's not controllable by the attacker
* but the denial of service scenario / attack vector is valid (consider network
facing application using glibc's regexp matching on untrusted input)
Could you allocate a CVE id for this?
Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team
- CVE Request -- glibc: DoS due to a buffer overrun in regexp matcher by processing multibyte characters Jan Lieskovsky (Jan 30)