CPANSA-ActivePerl-2004-2022: ActivePerl vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2004-12-31T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2004-12-31T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | ||
Original language | Language | en | |
Also referred to |
Vulnerability Description
ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
Vulnerabilities
CVE-2004-2022
Vulnerability DescriptionActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
ActivePerl less than 5.10 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-ActivePerl-2004-2022 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2004/cpansa-activeperl-2004-2022.json - http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt external
http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt - http://www.perlmonks.org/index.pl?node_id=354145 external
http://www.perlmonks.org/index.pl?node_id=354145 - http://www.securityfocus.com/bid/10375 external
http://www.securityfocus.com/bid/10375 - http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html external
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html - http://marc.info/?l=full-disclosure&m=108489112131099&w=2 external
http://marc.info/?l=full-disclosure&m=108489112131099&w=2 - http://marc.info/?l=full-disclosure&m=108482796105922&w=2 external
http://marc.info/?l=full-disclosure&m=108482796105922&w=2 - http://marc.info/?l=full-disclosure&m=108483058514596&w=2 external
http://marc.info/?l=full-disclosure&m=108483058514596&w=2 - http://marc.info/?l=bugtraq&m=108489894009025&w=2 external
http://marc.info/?l=bugtraq&m=108489894009025&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/16169 external
https://exchange.xforce.ibmcloud.com/vulnerabilities/16169 - CVE-2004-2022 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2004-2022
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Fri Dec 31 00:00:00 2004 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/