CPANSA-perl-2017-12814: perl vulnerability
| Publisher |
giterlizzi |
Document category |
csaf_security_advisory |
| Initial release date |
2017-09-28T00:00:00 |
Engine |
CSAF Perl Toolkit 0.25 |
| Current release date |
2017-09-28T00:00:00 |
Build Date |
|
| Current version |
1 |
Status |
final |
| CVSS v3.1 Base Score |
9.8
|
Severity |
Critical
|
| Original language |
|
Language |
en |
| Also referred to |
|
Vulnerability Description
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
Vulnerabilities
CVE-2017-12814
Vulnerability DescriptionStack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
| Weakness |
CWE-119 : Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Product status
Known affected
| Product |
Score |
| perl greater than or equal 5.24.0 and less than 5.24.3 |
|
| perl equal =5.26.0 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
Revision history
| Version |
Date of the revision |
Summary of the revision |
| 1 |
Thu Sep 28 00:00:00 2017 |
First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/