Do your applications use this vulnerable package?
Test your applications
Overview
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
References
CVSS Score
9.8
low severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityHigh
- CVE
- CVE-2019-9169
- CWE
- CWE-125
- Snyk ID
- SNYK-UBUNTU1604-GLIBC-451229
- Disclosed
- 26 Feb, 2019
- Published
- 26 Feb, 2019