Total vulnerabilities in the database
The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
Software | From | Fixed in |
---|---|---|
gnu / glibc | 2.1.2 | 2.1.2.x |
gnu / glibc | 2.11 | 2.11.x |
gnu / glibc | 2.10.1 | 2.10.1.x |
gnu / glibc | 1.00 | 1.00.x |
gnu / glibc | 1.06 | 1.06.x |
gnu / glibc | 2.1.1 | 2.1.1.x |
gnu / glibc | 1.02 | 1.02.x |
gnu / glibc | 1.07 | 1.07.x |
gnu / glibc | 2.12.0 | 2.12.0.x |
gnu / glibc | 2.1.1.6 | 2.1.1.6.x |
gnu / glibc | 1.04 | 1.04.x |
gnu / glibc | 1.01 | 1.01.x |
gnu / glibc | 2.1 | 2.1.x |
gnu / glibc | 1.09.1 | 1.09.1.x |
gnu / glibc | 2.1.9 | 2.1.9.x |
gnu / glibc | 2.12.1 | 2.12.1.x |
gnu / glibc | 1.09 | 1.09.x |
gnu / glibc | 2.10 | 2.10.x |
gnu / glibc | 2.11.2 | 2.11.2.x |
gnu / glibc | 1.03 | 1.03.x |
gnu / glibc | 2.1.3.10 | 2.1.3.10.x |
gnu / glibc | 2.11.3 | 2.11.3.x |
gnu / glibc | 1.08 | 1.08.x |
gnu / glibc | 2.11.1 | 2.11.1.x |
gnu / glibc | 2.1.3 | 2.1.3.x |
gnu / glibc | 1.05 | 1.05.x |
gnu / glibc | 2.12.2 | 2.12.2.x |
gnu / glibc | 2.10.2 | 2.10.2.x |