Vulnerability Details : CVE-2009-5155
Potential exploit
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
Vulnerability category: Denial of service
Products affected by CVE-2009-5155
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-5155
1.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-5155
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2009-5155
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-5155
-
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
-
https://security.netapp.com/advisory/ntap-20190315-0002/
March 2019 GNU C Vulnerabilities in NetApp Products | NetApp Product SecurityPatch;Third Party Advisory
-
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
#34238 - Assertion `num >= 0' failed at regexec.c:1363 - GNU bug report logsExploit;Mailing List;Vendor Advisory
-
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
18986 – (CVE-2009-5155) ERE '0|()0|\1|0' causes regexec undefined behaviorExploit;Issue Tracking;Third Party Advisory
-
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
11053 – Wrong results with backreferencesIssue Tracking;Exploit;Third Party Advisory
-
https://support.f5.com/csp/article/K64119434
GNU C Library vulnerability CVE-2009-5155
-
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
#22793 - grep -E assertion failure with back references - GNU bug report logsMailing List;Vendor Advisory
-
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672
sourceware.org Git - glibc.git/commitMailing List;Patch;Third Party Advisory
-
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
#32806 - An assertion is hit when processing "(|()()0)\2" extended regular expression - GNU bug report logsExploit;Mailing List;Vendor Advisory
-
https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS
GNU C Library vulnerability CVE-2009-5155
-
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
gnulib.git - gnulib - GNU portability libraryMailing List;Patch;Vendor Advisory
-
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
[GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 - Pony Mail
Jump to