CVE-2012-5195
perl: heap buffer overrun flaw may lead to arbitrary code execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
Desbordamiento de bufer en memoria dinámica en la función Perl_repeatcpy en util.c en Perl v5.12.x antes de v5.12.5, v5.14.x antes de v5.14.3, y v5.15.x antes de v5.15.5 permite a atacantes dependientes de contexto provocar una denegación de servicio (consumo de memoria y caída) o posiblemente ejecutar código arbitrario mediante el operador 'x' string repeat.
Perl is a high-level programming language commonly used for system administration utilities and web programming. A heap overflow flaw was found in Perl. If a Perl application allowed user input to control the count argument of the string repeat operator, an attacker could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. A denial of service flaw was found in the way Perl's rehashing code implementation, responsible for recalculation of hash keys and redistribution of hash content, handled certain input. If an attacker supplied specially-crafted input to be used as hash keys by a Perl application, it could cause excessive memory consumption.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-09-28 CVE Reserved
- 2012-10-26 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 | X_refsource_confirm | |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | X_refsource_confirm | |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735 | X_refsource_confirm | |
http://secunia.com/advisories/55314 | Third Party Advisory | |
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html | Mailing List | |
http://www.openwall.com/lists/oss-security/2012/10/26/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2012/10/27/1 | Mailing List |
|
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | X_refsource_confirm |
|
http://www.securityfocus.com/bid/56287 | Vdb Entry | |
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44 | 2016-12-08 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-0685.html | 2016-12-08 | |
http://secunia.com/advisories/51457 | 2016-12-08 | |
http://www.debian.org/security/2012/dsa-2586 | 2016-12-08 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:113 | 2016-12-08 | |
http://www.ubuntu.com/usn/USN-1643-1 | 2016-12-08 | |
https://access.redhat.com/security/cve/CVE-2012-5195 | 2013-03-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=862413 | 2013-03-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | rc0 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | rc1 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | rc2 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | rc3 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | rc4 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.0 Search vendor "Perl" for product "Perl" and version "5.12.0" | rc5 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.1 Search vendor "Perl" for product "Perl" and version "5.12.1" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.1 Search vendor "Perl" for product "Perl" and version "5.12.1" | rc1 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.1 Search vendor "Perl" for product "Perl" and version "5.12.1" | rc2 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.2 Search vendor "Perl" for product "Perl" and version "5.12.2" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.2 Search vendor "Perl" for product "Perl" and version "5.12.2" | rc1 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.3 Search vendor "Perl" for product "Perl" and version "5.12.3" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.3 Search vendor "Perl" for product "Perl" and version "5.12.3" | rc1 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.3 Search vendor "Perl" for product "Perl" and version "5.12.3" | rc2 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.3 Search vendor "Perl" for product "Perl" and version "5.12.3" | rc3 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.12.4 Search vendor "Perl" for product "Perl" and version "5.12.4" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.14.0 Search vendor "Perl" for product "Perl" and version "5.14.0" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.14.0 Search vendor "Perl" for product "Perl" and version "5.14.0" | rc1 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.14.0 Search vendor "Perl" for product "Perl" and version "5.14.0" | rc2 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.14.0 Search vendor "Perl" for product "Perl" and version "5.14.0" | rc3 |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.14.1 Search vendor "Perl" for product "Perl" and version "5.14.1" | - |
Affected
| ||||||
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | 5.14.2 Search vendor "Perl" for product "Perl" and version "5.14.2" | - |
Affected
|