GNU C Library Function Multibyte Character Handling Local Overflow DoS Vulnerability
29 Apr. 2013
Summary
GNU C library (glibc) posix/regexec.c extend_buffers() function multibyte character handling local overflow suffers from denial of service vulnerability
Credit:
The information has been provided by Paolo Bonzini.
GNU C Library (glibc) contains an overflow condition in the extend_buffers() function of posix/regexec.c. The issue is triggered as user-supplied input is not properly validated when handling multibyte characters in an expression. With a specially crafted expression, a local attacker can cause a buffer overflow, resulting in a denial of service..