Vulnerability CVE-2016-1246


Published: 2016-10-05

Description:
Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
PERL -> PERL 
Debian -> Debian linux 
Dbd-mysql project -> Dbd-mysql 

 References:
http://blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.html
http://www.debian.org/security/2016/dsa-3684
http://www.securityfocus.com/bid/93337
https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2
https://security.gentoo.org/glsa/201701-51

Copyright 2024, cxsecurity.com

 

Back to Top