2.1
CVSSv2

CVE-2004-2022

Published: 31/12/2004 Updated: 11/07/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.

Vulnerable Product Search on Vulmon Subscribe to Product

activestate activeperl 5.7.3

activestate activeperl 5.8

activestate activeperl 5.7.1

activestate activeperl 5.7.2

activestate activeperl 5.6.1

activestate activeperl 5.6.1.630

activestate activeperl 5.6.2

activestate activeperl 5.6.3

Exploits

source: wwwsecurityfocuscom/bid/10375/info ActiveState Perl and Perl for cygwin are both reported to be prone to a buffer overflow vulnerability The issue is reported to exist due to a lack of sufficient bounds checking that is performed on data that is passed to a Perl system() function call This vulnerability may permit an attacker ...