Secunia Advisory: | SA11298 | | Release Date: | 2004-04-06 |
| Critical: | Highly critical | Impact: | System access
| Where: | From remote
| Solution Status: | Vendor Patch |
| Software: | ActivePerl 5.x Perl 5.x
| | Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it. |
| CVE reference: | CVE-2004-0377
|
| Description: iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which potentially can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "win32_stat()" function. This can be exploited to cause a buffer overflow by passing an overly long filename with a backslash appended at the end to the function.
Successful exploitation may allow execution of arbitrary code on a system where it is possible for a person to supply a specially crafted pathname to a Perl script (e.g. on a web server).
The vulnerability has been reported in Perl 5.8.3 and prior for Windows.
Solution: The vulnerability will reportedly be fixed in Perl 5.8.4.
Patches are available for ActivePerl.
Perl 5.9.x development branch: http://public.activestate.com/cgi-bin/perlbrowse?patch=22466
Perl 5.8.x maintenance branch: http://public.activestate.com/cgi-bin/perlbrowse?patch=22552
Provided and/or discovered by: Greg MacManus, iDEFENSE Labs.
Original Advisory: http://www.idefense.com/applicat...y?id=93&type=vulnerabilities
|
| Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others. |
| |
|
Send Feedback to Secunia: |
| If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.
Ideas, suggestions, and other feedback is most welcome. | |
|
|
Found: 6 Related Secunia Security Advisories |
|
- ActivePerl sitecustomize.pl Privilege Escalation |
- Perl Explicit Format Parameter Index Integer Overflow Vulnerability |
- |
- |
- |
- Perl Multiple Scripts Insecure Temporary File Creation Vulnerabilities |