ID CVE-2010-1158
Summary Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.
References
Vulnerable Configurations
  • cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 24-10-2013 - 03:22)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm http://perldoc.perl.org/perl5100delta.html
misc
mlist
  • [oss-security] 20100408 CVE Request -- perl v5.8.* -- stack overflow by processing certain regex (Gentoo BTS#313565 / RH BZ#580605)
  • [oss-security] 20100414 Re: CVE Request -- perl v5.8.* -- stack overflow by processing certain regex (Gentoo BTS#313565 / RH BZ#580605)
secunia 55314
statements via4
contributor Tomas Hoger
lastmodified 2010-04-22
organization Red Hat
statement The Red Hat Security Response Team has rated this issue as having low security impact. The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, or 5.
Last major update 24-10-2013 - 03:22
Published 20-04-2010 - 15:30
Last modified 24-10-2013 - 03:22
Back to Top