国产一级a片免费看高清,亚洲熟女中文字幕在线视频,黄三级高清在线播放,免费黄色视频在线看

打開APP
userphoto
未登錄

開通VIP,暢享免費(fèi)電子書等14項(xiàng)超值服

開通VIP
Perl win32_stat Function Buffer Overflow Vulnerability
Secunia Advisory: SA11298
  
Release Date: 2004-04-06

Critical:

Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

Software: ActivePerl 5.x
Perl 5.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

CVE reference: CVE-2004-0377

Description:
iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which potentially can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the "win32_stat()" function. This can be exploited to cause a buffer overflow by passing an overly long filename with a backslash appended at the end to the function.

Successful exploitation may allow execution of arbitrary code on a system where it is possible for a person to supply a specially crafted pathname to a Perl script (e.g. on a web server).

The vulnerability has been reported in Perl 5.8.3 and prior for Windows.

Solution:
The vulnerability will reportedly be fixed in Perl 5.8.4.

Patches are available for ActivePerl.

Perl 5.9.x development branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22466

Perl 5.8.x maintenance branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552

Provided and/or discovered by:
Greg MacManus, iDEFENSE Labs.

Original Advisory:
http://www.idefense.com/applicat...y?id=93&type=vulnerabilities


Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia:

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback is most welcome.


Found: 6 Related Secunia Security Advisories

- ActivePerl sitecustomize.pl Privilege Escalation
- Perl Explicit Format Parameter Index Integer Overflow Vulnerability
-
-
-
- Perl Multiple Scripts Insecure Temporary File Creation Vulnerabilities
本站僅提供存儲服務(wù),所有內(nèi)容均由用戶發(fā)布,如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請點(diǎn)擊舉報(bào)
打開APP,閱讀全文并永久保存 查看更多類似文章
猜你喜歡
類似文章
CPU漏洞詳解
圖片另存為可能存在漏洞
【漏洞管理大討論1】ICS-CERT常見漏洞管理策略分析報(bào)告
Android內(nèi)核漏洞利用技術(shù)實(shí)戰(zhàn):環(huán)境搭建&棧溢出實(shí)戰(zhàn)
Buffer Overflow Attacks and Their Countermeas (1)
Hacking with GDB · GitBook
更多類似文章 >>
生活服務(wù)
分享 收藏 導(dǎo)長圖 關(guān)注 下載文章
綁定賬號成功
后續(xù)可登錄賬號暢享VIP特權(quán)!
如果VIP功能使用有故障,
可點(diǎn)擊這里聯(lián)系客服!

聯(lián)系客服