CPANSA-ActivePerl-2004-2022: ActivePerl vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2004-12-31T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2004-12-31T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score Severity
Original language Language en
Also referred to

Vulnerability Description

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.

Vulnerabilities

CVE-2004-2022

Vulnerability Description

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.

Product status

Known affected
Product Score
ActivePerl less than 5.10
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
2.0 AV:L/AC:L/Au:N/C:N/I:N/A:P 2.1 Low

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Fri Dec 31 00:00:00 2004 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/