CPANSA-perl-2010-4777: perl vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2014-02-10T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2014-02-10T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score Severity
Original language Language en
Also referred to

Vulnerability Description

The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.

Vulnerabilities

CVE-2010-4777

Vulnerability Description

The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.

Weakness CWE-20 : Improper Input Validation

Product status

Known affected
Product Score
perl less than or equal 5.14.0
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
2.0 AV:N/AC:M/Au:N/C:N/I:N/A:P 4.3 Medium
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Mon Feb 10 00:00:00 2014 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/