{ "schema_version": "1.4.0", "id": "GHSA-xq2p-cgwj-87m3", "modified": "2022-05-14T02:42:49Z", "published": "2022-05-14T02:42:49Z", "aliases": [ "CVE-2010-4052" ], "details": "Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4052" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645859" }, { "type": "WEB", "url": "http://cxib.net/stuff/proftpd.gnu.c" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2011/Jan/78" }, { "type": "WEB", "url": "http://secunia.com/advisories/42547" }, { "type": "WEB", "url": "http://securityreason.com/achievement_securityalert/93" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/8003" }, { "type": "WEB", "url": "http://securitytracker.com/id?1024832" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/15935" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/912279" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/515589/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/45233" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-01-13T19:00:00Z" } }