[Forgot Password]
Login  Register Subscribe

23631

 
 

126173

 
 

98218

 
 

909

 
 

79224

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2005-3962

Date: (C)2005-12-01   (M)2017-10-12 


Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.

CVSS Score: 4.6Access Vector: LOCAL
Exploit Score: 3.9Access Complexity: LOW
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
SUNALERT-102192
BID-15629
SECUNIA-17762
SECUNIA-17802
SECUNIA-17844
SECUNIA-17941
SECUNIA-17952
SECUNIA-17993
SECUNIA-18075
SECUNIA-18183
SECUNIA-18187
SECUNIA-18295
SECUNIA-18413
SECUNIA-18517
SECUNIA-19041
http://www.securityfocus.com/archive/1/archive/1/418333/100/0/threaded
20060101-01-U
SECUNIA-20894
OSVDB-21345
OSVDB-22255
SECUNIA-23155
SECUNIA-31208
ADV-2005-2688
ADV-2006-0771
ADV-2006-2613
ADV-2006-4750
APPLE-SA-2006-11-28
CLSA-2006:1056
DSA-943
FLSA-2006:176731
GLSA-200512-01
MDKSA-2005:225
OpenPKG-SA-2005.025
RHSA-2005:880
RHSA-2005:881
SSRT061105
SUSE-SA:2005:071
SUSE-SR:2005:029
TA06-333A
TSLSA-2005-0070
USN-222-1
VU#948385
http://www.openbsd.org/errata37.html#perl
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch
http://docs.info.apple.com/article.html?artnum=304829
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
http://www.dyadsecurity.com/perl-0002.html
http://www.ipcop.org/index.php?name=News&file=article&sid=41

CPE    2
cpe:/a:perl:perl:5.8.6
cpe:/a:perl:perl:5.9.2
CWE    1
CWE-189

© 2013 SecPod Technologies