Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.803161
Categoría:Buffer overflow
Título:Strawberry Perl 'Perl_repeatcpy()' Function Buffer Overflow Vulnerability (Windows)
Resumen:The host is installed with Strawberry Perl and is prone to heap; based buffer overflow vulnerability.
Descripción:Summary:
The host is installed with Strawberry Perl and is prone to heap
based buffer overflow vulnerability.

Vulnerability Insight:
The Perl_repeatcpy() function in util.c fails to properly sanitize user
supplied input while handling the string repeat operator.

Vulnerability Impact:
Successful exploitation will allow attackers to cause a denial of service
(memory consumption and crash) or possibly execute arbitrary code via the
'x' string repeat operator.

Affected Software/OS:
Strawberry Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3 and
5.15.x before 15.15.5 on Windows

Solution:
Upgrade to Strawberry Perl 5.12.5, 5.14.3, 15.15.5 or later.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: BugTraq ID: 56287
Common Vulnerability Exposure (CVE) ID: CVE-2012-5195
http://www.securityfocus.com/bid/56287
Debian Security Information: DSA-2586 (Google Search)
http://www.debian.org/security/2012/dsa-2586
http://www.mandriva.com/security/advisories?name=MDVSA-2013:113
http://www.openwall.com/lists/oss-security/2012/10/26/2
http://www.openwall.com/lists/oss-security/2012/10/27/1
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
RedHat Security Advisories: RHSA-2013:0685
http://rhn.redhat.com/errata/RHSA-2013-0685.html
http://secunia.com/advisories/51457
http://secunia.com/advisories/55314
http://www.ubuntu.com/usn/USN-1643-1
CopyrightCopyright (c) 2013 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.