Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent malicious users to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
larry_wall perl 5.8.4.1 |
||
larry_wall perl 5.8.4.2 |
||
openpkg openpkg current |
||
redhat enterprise_linux 1.0 |
||
larry_wall perl 5.8.4.2.3 |
||
larry_wall perl 5.8.4.3 |
||
larry_wall perl 5.8.3 |
||
larry_wall perl 5.8.4 |
||
larry_wall perl 5.8.6 |
||
mandrakesoft mandrake_multi_network_firewall 2.0 |
||
larry_wall perl 5.8.0 |
||
larry_wall perl 5.8.1 |
||
larry_wall perl 5.8.4.4 |
||
larry_wall perl 5.8.4.5 |