ID |
CVE-2023-47038
|
Summary |
A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:perl:perl:5.34.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.34.0:*:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
|
CVSS |
Base: | None |
Impact: | |
Exploitability: | |
|
CWE |
CWE-787 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
|
|
|
|
Impact |
Confidentiality | Integrity | Availability |
|
|
|
|
Last major update |
16-09-2024 - 16:15 |
Published |
18-12-2023 - 14:15 |
Last modified |
16-09-2024 - 16:15 |