[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2005-3962Date: (C)2005-12-01   (M)2018-02-19


Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : CVSS Score  : 4.6
Exploit Score: Exploit Score: 3.9
Impact Score : Impact Score : 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: LOCAL
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  





Reference:
SUNALERT-102192
BID-15629
SECUNIA-17762
SECUNIA-17802
SECUNIA-17844
SECUNIA-17941
SECUNIA-17952
SECUNIA-17993
SECUNIA-18075
SECUNIA-18183
SECUNIA-18187
SECUNIA-18295
SECUNIA-18413
SECUNIA-18517
SECUNIA-19041
http://www.securityfocus.com/archive/1/archive/1/418333/100/0/threaded
20060101-01-U
SECUNIA-20894
OSVDB-21345
OSVDB-22255
SECUNIA-23155
SECUNIA-31208
ADV-2005-2688
ADV-2006-0771
ADV-2006-2613
ADV-2006-4750
APPLE-SA-2006-11-28
CLSA-2006:1056
DSA-943
FLSA-2006:176731
GLSA-200512-01
MDKSA-2005:225
OpenPKG-SA-2005.025
RHSA-2005:880
RHSA-2005:881
SSRT061105
SUSE-SA:2005:071
SUSE-SR:2005:029
TA06-333A
TSLSA-2005-0070
USN-222-1
VU#948385
http://www.openbsd.org/errata37.html#perl
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch
http://docs.info.apple.com/article.html?artnum=304829
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
http://www.dyadsecurity.com/perl-0002.html
http://www.ipcop.org/index.php?name=News&file=article&sid=41

CPE    2
cpe:/a:perl:perl:5.9.2
cpe:/a:perl:perl:5.8.6
CWE    1
CWE-189

© 2013 SecPod Technologies