Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 348336 (CVE-2010-4051) - sys-libs/glibc: Denial of Service via stack exhaustion in regcomp() (CVE-2010-{4051,4052})
Summary: sys-libs/glibc: Denial of Service via stack exhaustion in regcomp() (CVE-2010...
Status: RESOLVED FIXED
Alias: CVE-2010-4051
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.kb.cert.org/vuls/id/912279
Whiteboard: A3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-12-10 06:32 UTC by Tim Sammut (RETIRED)
Modified: 2014-06-16 03:33 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2010-12-10 06:32:24 UTC
From $URL:

Overview
The regcomp() function of GNU libc is susceptible to stack exhaustion which may result in a denial of service.

I. Description
It is possible to trigger deep recursion which results in stack exhaustion. An example trigger is: grep -E ".*{10,}{10,}{10,}{10,}{10,}"

II. Impact
An attacker may be able to trigger a denial of service in applications that accept regular expressions.
Comment 1 SpanKY gentoo-dev 2010-12-10 07:18:30 UTC
how is this any different from Bug 340061 ?  glob and regexp have unbounded memory footprint so once again, any server that processes these things and is outward facing should be using some sort of resource limiting.
Comment 2 Paweł Hajdan, Jr. (RETIRED) gentoo-dev 2011-01-08 06:29:24 UTC
More detailed analysis is available at http://seclists.org/bugtraq/2011/Jan/35
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2011-10-08 13:28:58 UTC
CVE-2010-4052 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4052):
  Stack consumption vulnerability in the regcomp implementation in the GNU C
  Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2,
  allows context-dependent attackers to cause a denial of service (resource
  exhaustion) via a regular expression containing adjacent repetition
  operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the
  proftpd.gnu.c exploit for ProFTPD.

CVE-2010-4051 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4051):
  The regcomp implementation in the GNU C Library (aka glibc or libc6) through
  2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to
  cause a denial of service (application crash) via a regular expression
  containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX
  limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the
  proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
Comment 4 SpanKY gentoo-dev 2012-04-13 23:33:16 UTC
suggest closing this out as nothing to do ...
Comment 5 Yury German Gentoo Infrastructure gentoo-dev 2014-06-16 03:33:46 UTC
This has been fixed prior to glsa-201312-01
http://www.gentoo.org/security/en/glsa/glsa-201312-01.xml

Closing Resolved / Fixed.