CVE-2010-4777
Perl 5.x - 'Perl_reg_numbered_buff_fetch()' Remote Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
La función Perl_reg_numbered_buff_fetch en Perl 5.10.0, 5.12.0, 5.14.0 y otras versiones, cuando funciona con debugging activado, permite a atacantes dependientes de contexto causar una denegación de servicio (fallo de aserción y cierre de la aplicación) a través de una entrada manipulada que no es manejada adecuadamente cuando hace uso de ciertas expresiones regulares, como se ha demostrado causando la caída de SpamAssassin y OCSInventory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-03-23 First Exploit
- 2011-03-28 CVE Reserved
- 2014-02-10 CVE Published
- 2024-07-05 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836 | X_refsource_misc | |
http://forums.ocsinventory-ng.org/viewtopic.php?id=7215 | X_refsource_misc | |
https://bugzilla.redhat.com/show_bug.cgi?id=694166 | X_refsource_misc | |
https://listi.jpberlin.de/pipermail/postfixbuch-users/2011-February/055885.html | Mailing List | |
https://rt.perl.org/Public/Bug/Display.html?id=76538 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/35489 | 2011-03-23 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html | 2014-02-10 | |
http://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html | 2014-02-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.10 Search vendor "Perl" for product "Perl" and version "5.10" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.14.0 Search vendor "Perl" for product "Perl" and version "5.14.0" | - |
Affected
|