Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2018-18314 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 7 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity Impact | Low |
Availability Impact | High |
Platform | Errata | Release Date |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux 7 (rh-perl524-perl) | RHSA-2019:0010 | 2019-01-02 |
Red Hat Software Collections for Red Hat Enterprise Linux 7 (rh-perl526-perl) | RHSA-2019:0001 | 2019-01-02 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 (rh-perl524-perl) | RHSA-2019:0010 | 2019-01-02 |
Platform | Package | State |
---|---|---|
Red Hat OpenShift Enterprise 3 | perl | Not affected |
Red Hat Enterprise Linux 7 | perl | Not affected |
Red Hat Enterprise Linux 6 | perl | Not affected |
Red Hat Enterprise Linux 5 | perl | Not affected |