CVE-2014-4330
Mandriva Linux Security Advisory 2014-199
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
5Exploited in Wild
-Decision
Descriptions
The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
El método Dumper en Data::Dumper anterior a 2.154, utilizado en Perl 5.20.1 y anteriores, permite a atacantes dependientes de contexto causar una denegación de servicio (consumo de la pila y caída) a través de una referencia de array con muchas referencias de array anidadas, lo que provoca un número grande de llamadas recursivas a la función DD_dump.
The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function. Also, the Text::Wrap version provided in perl contains a bug that can lead to a code path that shouldn't be hit. This can lead to crashes in other software, such as Bugzilla. The Text::Wrap module bundled with Perl has been patched and the Data::Dumper module bundled with Perl has been updated to fix these issues.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-06-18 CVE Reserved
- 2014-09-25 CVE Published
- 2014-09-25 First Exploit
- 2024-08-06 CVE Updated
- 2025-07-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://advisories.mageia.org/MGASA-2014-0406.html | X_refsource_confirm | |
http://secunia.com/advisories/61441 | Third Party Advisory | |
http://secunia.com/advisories/61961 | Third Party Advisory | |
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html | Mailing List | |
http://www.securityfocus.com/archive/1/533543/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/70142 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216 | Vdb Entry | |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 | X_refsource_confirm | |
https://metacpan.org/pod/distribution/Data-Dumper/Changes | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/128422 | 2014-09-25 | |
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html | 2024-08-06 | |
http://seclists.org/fulldisclosure/2014/Sep/84 | 2024-08-06 | |
http://seclists.org/oss-sec/2014/q3/692 | 2024-08-06 | |
https://www.lsexperts.de/advisories/lse-2014-06-10.txt | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html | 2018-10-09 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136 | 2018-10-09 | |
http://www.ubuntu.com/usn/USN-2916-1 | 2018-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Perl Search vendor "Perl" | Perl Search vendor "Perl" for product "Perl" | <= 5.20.1 Search vendor "Perl" for product "Perl" and version " <= 5.20.1" | - |
Affected
| ||||||
Data Dumper Project Search vendor "Data Dumper Project" | Data Dumper Search vendor "Data Dumper Project" for product "Data Dumper" | <= 2.151 Search vendor "Data Dumper Project" for product "Data Dumper" and version " <= 2.151" | - |
Affected
|