CPANSA-perl-2008-1927: perl vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2008-04-24T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2008-04-24T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | ||
Original language | Language | en | |
Also referred to |
Vulnerability Description
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
Vulnerabilities
CVE-2008-1927
Vulnerability DescriptionDouble free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
Weakness | CWE-399 : Resource Management Errors |
---|
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
perl less than or equal 5.8.8 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-perl-2008-1927 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2008/cpansa-perl-2008-1927.json - http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156 external
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792 external
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792 - http://www.debian.org/security/2008/dsa-1556 external
http://www.debian.org/security/2008/dsa-1556 - https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html external
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html - https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html external
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html - http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml external
http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml - http://www.securityfocus.com/bid/28928 external
http://www.securityfocus.com/bid/28928 - http://secunia.com/advisories/29948 external
http://secunia.com/advisories/29948 - http://secunia.com/advisories/30025 external
http://secunia.com/advisories/30025 - http://secunia.com/advisories/30326 external
http://secunia.com/advisories/30326 - http://www.securitytracker.com/id?1020253 external
http://www.securitytracker.com/id?1020253 - http://www.redhat.com/support/errata/RHSA-2008-0522.html external
http://www.redhat.com/support/errata/RHSA-2008-0522.html - http://secunia.com/advisories/30624 external
http://secunia.com/advisories/30624 - http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm external
http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm - http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm external
http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm - http://www.ipcop.org/index.php?name=News&file=article&sid=41 external
http://www.ipcop.org/index.php?name=News&file=article&sid=41 - http://secunia.com/advisories/31467 external
http://secunia.com/advisories/31467 - http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html external
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html - http://secunia.com/advisories/31604 external
http://secunia.com/advisories/31604 - http://secunia.com/advisories/31208 external
http://secunia.com/advisories/31208 - http://secunia.com/advisories/31328 external
http://secunia.com/advisories/31328 - http://www.vmware.com/security/advisories/VMSA-2008-0013.html external
http://www.vmware.com/security/advisories/VMSA-2008-0013.html - http://www.redhat.com/support/errata/RHSA-2008-0532.html external
http://www.redhat.com/support/errata/RHSA-2008-0532.html - http://secunia.com/advisories/31687 external
http://secunia.com/advisories/31687 - http://osvdb.org/44588 external
http://osvdb.org/44588 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:100 external
http://www.mandriva.com/security/advisories?name=MDVSA-2008:100 - http://www.ubuntu.com/usn/usn-700-1 external
http://www.ubuntu.com/usn/usn-700-1 - http://secunia.com/advisories/33314 external
http://secunia.com/advisories/33314 - http://wiki.rpath.com/Advisories:rPSA-2009-0011 external
http://wiki.rpath.com/Advisories:rPSA-2009-0011 - http://www.ubuntu.com/usn/usn-700-2 external
http://www.ubuntu.com/usn/usn-700-2 - http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html external
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html - http://secunia.com/advisories/33937 external
http://secunia.com/advisories/33937 - http://support.apple.com/kb/HT3438 external
http://support.apple.com/kb/HT3438 - http://www.vupen.com/english/advisories/2009/0422 external
http://www.vupen.com/english/advisories/2009/0422 - http://www.vupen.com/english/advisories/2008/2361 external
http://www.vupen.com/english/advisories/2008/2361 - http://www.vupen.com/english/advisories/2008/2424 external
http://www.vupen.com/english/advisories/2008/2424 - http://www.vupen.com/english/advisories/2008/2265/references external
http://www.vupen.com/english/advisories/2008/2265/references - https://exchange.xforce.ibmcloud.com/vulnerabilities/41996 external
https://exchange.xforce.ibmcloud.com/vulnerabilities/41996 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579 external
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579 - http://www.securityfocus.com/archive/1/500210/100/0/threaded external
http://www.securityfocus.com/archive/1/500210/100/0/threaded - CVE-2008-1927 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2008-1927
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Thu Apr 24 00:00:00 2008 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/