CPANSA-DBI-2020-01: DBI vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2020-09-16T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2020-09-16T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | 7.1 | Severity | High |
Original language | Language | en | |
Also referred to |
Vulnerability Description
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
Vulnerabilities
CVE-2020-14393
Vulnerability DescriptionA buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
Weakness | CWE-121 : Stack-based Buffer Overflow |
---|
Product status
Known affected
Product | Score | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DBI less than 1.643 |
|
Fixed
- DBI greater than or equal 1.643
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-DBI-2020-01 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2020/cpansa-dbi-2020-01.json - https://metacpan.org/changes/distribution/DBI external
https://metacpan.org/changes/distribution/DBI - https://bugzilla.redhat.com/show_bug.cgi?id=1877409 external
https://bugzilla.redhat.com/show_bug.cgi?id=1877409 - CVE-2020-14393 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2020-14393
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Wed Sep 16 00:00:00 2020 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/