[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2005-3962

Date: (C)2005-12-01   (M)2017-10-12
 
CVSS Score: 4.6Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.

Reference:
SUNALERT-102192
BID-15629
SECUNIA-17762
SECUNIA-17802
SECUNIA-17844
SECUNIA-17941
SECUNIA-17952
SECUNIA-17993
SECUNIA-18075
SECUNIA-18183
SECUNIA-18187
SECUNIA-18295
SECUNIA-18413
SECUNIA-18517
SECUNIA-19041
http://www.securityfocus.com/archive/1/archive/1/418333/100/0/threaded
20060101-01-U
SECUNIA-20894
OSVDB-21345
OSVDB-22255
SECUNIA-23155
SECUNIA-31208
ADV-2005-2688
ADV-2006-0771
ADV-2006-2613
ADV-2006-4750
APPLE-SA-2006-11-28
CLSA-2006:1056
DSA-943
FLSA-2006:176731
GLSA-200512-01
MDKSA-2005:225
OpenPKG-SA-2005.025
RHSA-2005:880
RHSA-2005:881
SSRT061105
SUSE-SA:2005:071
SUSE-SR:2005:029
TA06-333A
TSLSA-2005-0070
USN-222-1
VU#948385
http://www.openbsd.org/errata37.html#perl
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch
http://docs.info.apple.com/article.html?artnum=304829
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
http://www.dyadsecurity.com/perl-0002.html
http://www.ipcop.org/index.php?name=News&file=article&sid=41

CPE    2
cpe:/a:perl:perl:5.8.6
cpe:/a:perl:perl:5.9.2
CWE    1
CWE-189

© 2013 SecPod Technologies