Vulnerability CVE-2004-2022


Published: 2004-12-31   Modified: 2012-02-12

Description:
ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Activestate -> Activeperl 

 References:
http://xforce.iss.net/xforce/xfdb/16169
http://www.securityfocus.com/bid/10375
http://www.perlmonks.org/index.pl?node_id=354145
http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt
http://marc.theaimsgroup.com/?l=full-disclosure&m=108489112131099&w=2
http://marc.theaimsgroup.com/?l=full-disclosure&m=108483058514596&w=2
http://marc.theaimsgroup.com/?l=full-disclosure&m=108482796105922&w=2
http://marc.theaimsgroup.com/?l=bugtraq&m=108489894009025&w=2
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html

Copyright 2020, cxsecurity.com

 

Back to Top