Vulnerability CVE-2018-18313


Published: 2018-12-07

Description:
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.

Type:

CWE-125

(Out-of-bounds Read)

Vendor: Debian
Product: Debian linux 
Version: 9.0;
Vendor: Redhat
Product: Enterprise linux 
Version:
7.6
7.5
7.4
7.0
6.0
See more versions on NVD
Vendor: PERL
Product: PERL 
Version:
5.9.2
5.8.9
5.8.8
5.8.7
5.8.6
5.8.5
5.8.4
5.8.3
5.8.2
5.8.10
5.8.1
5.8.0
5.6.1
5.6.0
5.23.9
5.22
5.20.1
5.18.4
5.17.7
5.16.2
5.16.1
5.16.0
5.14.3
5.14.2
5.14.1
5.14.0
5.13.9
5.13.8
5.13.7
5.13.6
5.13.5
5.13.4
5.13.3
5.13.2
5.13.11
5.13.10
5.13.1
5.13.0
5.12.3
5.12.2
5.12.1
5.12.0
5.11.5
5.11.4
5.11.3
5.11.2
5.11.1
5.11.0
5.10.1
5.10.0
5.10
2.9.2
2.9.1
2.9.0
2.8.8
2.8.7
2.8.6
2.8.5
2.8.4
2.8.3
2.8.2
2.8.1
2.8.0
2.7.2
2.7.1
2.7.0
2.6.6
2.6.5
2.6.4
2.6.3
2.6.2
2.6.1
2.6.0
2.5.1
2.5.0
2.4.0
2.3.0
2.2.2
2.2.1
2.2.0
2.18.1
2.18.0
2.17.2
2.17.1
2.17.0
2.16.1
2.16.0
2.15.1
2.15.0
2.14.1
2.14.0
2.13.0
2.12.0
See more versions on NVD

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
Partial

 References:
http://seclists.org/fulldisclosure/2019/Mar/49
http://www.securitytracker.com/id/1042181
https://access.redhat.com/errata/RHSA-2019:0001
https://access.redhat.com/errata/RHSA-2019:0010
https://bugzilla.redhat.com/show_bug.cgi?id=1646738
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
https://metacpan.org/changes/release/SHAY/perl-5.26.3
https://rt.perl.org/Ticket/Display.html?id=133192
https://seclists.org/bugtraq/2019/Mar/42
https://security.netapp.com/advisory/ntap-20190221-0003/
https://support.apple.com/kb/HT209600
https://usn.ubuntu.com/3834-1/
https://usn.ubuntu.com/3834-2/
https://www.debian.org/security/2018/dsa-4347

Related CVE
CVE-2018-18314
Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
CVE-2018-18311
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
CVE-2018-18312
Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
CVE-2018-12015
In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
CVE-2018-6913
Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
CVE-2018-6798
An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
CVE-2018-6797
An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
CVE-2017-12814
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.

Copyright 2019, cxsecurity.com

 

Back to Top