SB2019011808 - Denial of service in glibc



SB2019011808 - Denial of service in glibc

Published: January 18, 2019 Updated: March 1, 2019

Security Bulletin ID SB2019011808
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2019-6488)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy due to application that runs on  the x32 architecture incorrectly attempts to use a 64-bit register for size_t in assembly codes. A remote attacker can pass specially crafted data to the application using an affected library and cause segmentation fault.


2) Input validation error (CVE-ID: CVE-2009-5155)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input passed to parse_reg_exp() function in posix/regcomp.c . A local user can send specially crafted input to application that uses the affected version of glibc and perform denial of service attack.


Remediation

Install update from vendor's website.