7.5
CVSSv2

CVE-2013-1667

Published: 14/03/2013 Updated: 19/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 790
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The rehash mechanism in Perl 5.8.2 up to and including 5.16.x allows context-dependent malicious users to cause a denial of service (memory consumption and crash) via a crafted hash key.

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl 5.8.2

perl perl 5.8.9

perl perl 5.8.10

perl perl 5.10

perl perl 5.11.4

perl perl 5.11.5

perl perl 5.12.0

perl perl 5.12.3

perl perl 5.13.7

perl perl 5.13.6

perl perl 5.13.10

perl perl 5.13.11

perl perl 5.14.0

perl perl 5.16.2

perl perl 5.8.5

perl perl 5.8.6

perl perl 5.10.0

perl perl 5.11.2

perl perl 5.11.3

perl perl 5.12.2

perl perl 5.12.1

perl perl 5.13.3

perl perl 5.13.2

perl perl 5.14.1

perl perl 5.8.3

perl perl 5.8.4

perl perl 5.10.1

perl perl 5.11.1

perl perl 5.11.0

perl perl 5.13.1

perl perl 5.13.0

perl perl 5.14.3

perl perl 5.14.2

perl perl 5.16.0

perl perl 5.16.1

perl perl 5.8.7

perl perl 5.8.8

perl perl 5.12.4

perl perl 5.13.5

perl perl 5.13.4

perl perl 5.13.8

perl perl 5.13.9

Vendor Advisories

Synopsis Moderate: perl security update Type/Severity Security Advisory: Moderate Topic Updated perl packages that fix multiple security issues now availablefor Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingmoderate security impact Common Vulnerability S ...
Perl could be made to stop responding if it received specially crafted input ...
Yves Orton discovered a flaw in the rehashing code of Perl This flaw could be exploited to carry out a denial of service attack against code that uses arbitrary user input as hash keys Specifically an attacker could create a set of keys of a hash causing a denial of service via memory exhaustion For the stable distribution (squeeze), this proble ...
Debian Bug report logs - #702296 perl: CVE-2013-1667: rehashing flaw Package: src:perl; Maintainer for src:perl is Niko Tyni <ntyni@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 4 Mar 2013 21:00:01 UTC Severity: grave Tags: patch, security Found in versions perl/5101-17squeeze4, pe ...
Debian Bug report logs - #800564 php5: trivial hash complexity DoS attack Package: php5-cli; Maintainer for php5-cli is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5-cli is src:php5 (PTS, buildd, popcon) Reported by: "brian m carlson" <sandals@crustytoothpastenet> Date: Wed, 30 Sep ...
A heap overflow flaw was found in Perl If a Perl application allowed user input to control the count argument of the string repeat operator, an attacker could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2012-5195) A denial of service flaw was found in the way ...