#VU17885 Input validation error in Glibc - CVE-2009-5155
Published: March 1, 2019
Glibc
GNU
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input passed to parse_reg_exp() function in posix/regcomp.c . A local user can send specially crafted input to application that uses the affected version of glibc and perform denial of service attack.
Remediation
External links
- http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
- https://sourceware.org/bugzilla/show_bug.cgi?id=11053
- https://sourceware.org/bugzilla/show_bug.cgi?id=18986
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672