[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2005-3962Date: (C)2005-12-01   (M)2018-02-19


Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.6
Exploit Score: 3.9
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SUNALERT-102192
BID-15629
SECUNIA-17762
SECUNIA-17802
SECUNIA-17844
SECUNIA-17941
SECUNIA-17952
SECUNIA-17993
SECUNIA-18075
SECUNIA-18183
SECUNIA-18187
SECUNIA-18295
SECUNIA-18413
SECUNIA-18517
SECUNIA-19041
http://www.securityfocus.com/archive/1/archive/1/418333/100/0/threaded
20060101-01-U
SECUNIA-20894
OSVDB-21345
OSVDB-22255
SECUNIA-23155
SECUNIA-31208
ADV-2005-2688
ADV-2006-0771
ADV-2006-2613
ADV-2006-4750
APPLE-SA-2006-11-28
CLSA-2006:1056
DSA-943
FLSA-2006:176731
GLSA-200512-01
MDKSA-2005:225
OpenPKG-SA-2005.025
RHSA-2005:880
RHSA-2005:881
SSRT061105
SUSE-SA:2005:071
SUSE-SR:2005:029
TA06-333A
TSLSA-2005-0070
USN-222-1
VU#948385
http://www.openbsd.org/errata37.html#perl
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch
http://docs.info.apple.com/article.html?artnum=304829
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
http://www.dyadsecurity.com/perl-0002.html
http://www.ipcop.org/index.php?name=News&file=article&sid=41

CPE    2
cpe:/a:perl:perl:5.8.6
cpe:/a:perl:perl:5.9.2
CWE    1
CWE-189

© SecPod Technologies