Rapid7 Vulnerability & Exploit Database

Juniper Junos OS: GNU libc 'regcomp()' Stack Exhaustion Denial Of Service Vulnerability (JSA10612) (multiple CVEs)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Juniper Junos OS: GNU libc 'regcomp()' Stack Exhaustion Denial Of Service Vulnerability (JSA10612) (multiple CVEs)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
01/13/2011
Created
07/25/2018
Added
05/07/2014
Modified
03/21/2022

Description

Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.

Solution(s)

  • juniper-junos-os-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;