Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2013-02-08T20:00:00

Updated: 2024-08-06T14:18:09.596Z

Reserved: 2012-12-06T00:00:00

Link: CVE-2013-0242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2013-02-08T20:55:01.483

Modified: 2017-08-29T01:33:00.713

Link: CVE-2013-0242

cve-icon Redhat

Severity : Low

Publid Date: 2013-01-29T00:00:00Z

Links: CVE-2013-0242 - Bugzilla