4.3
CVSSv2

CVE-2010-4777

Published: 10/02/2014 Updated: 10/02/2014
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent malicious users to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl 5.14.0

perl perl 5.12.0

perl perl 5.10

Vendor Advisories

Debian Bug report logs - #628836 perl-debug: CVE-2010-4777 perl: assertion failure with certain regular expressions Package: perl-debug; Maintainer for perl-debug is Niko Tyni <ntyni@debianorg>; Source for perl-debug is src:perl (PTS, buildd, popcon) Reported by: Dominic Hargreaves <dom@earthli> Date: Wed, 1 Jun 2 ...
Debian Bug report logs - #622817 perl: CVE-2011-1487: taint laundering in lc, uc Package: perl; Maintainer for perl is Niko Tyni <ntyni@debianorg>; Source for perl is src:perl (PTS, buildd, popcon) Reported by: Dominic Hargreaves <dom@earthli> Date: Thu, 14 Apr 2011 21:12:02 UTC Severity: important Tags: fixed-ups ...

Exploits

source: wwwsecurityfocuscom/bid/47006/info Perl is prone to a remote denial-of-service vulnerability An attacker can exploit this issue to cause an application implemented with affected perl code to abort, denying service to legitimate users #!/usr/bin/perl my @x = ("A=B","AAAA=/"); utf8::upgrade $_ for @x; $x[1] =~ s{/\s*$}{}; for ...