5
CVSSv2

CVE-2017-12837

Published: 19/09/2017 Updated: 15/07/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 prior to 5.24.3-RC1 and 5.26.x prior to 5.26.1-RC1 allows remote malicious users to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier.

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl 5.26.0

perl perl

Vendor Advisories

Perl could be made to crash if it received specially crafted input ...
Debian Bug report logs - #875597 perl: CVE-2017-12883: Buffer over-read in regular expression parser Package: src:perl; Maintainer for src:perl is Niko Tyni <ntyni@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 12 Sep 2017 13:33:04 UTC Severity: grave Tags: patch, security, upstream Fo ...
Debian Bug report logs - #875596 perl: CVE-2017-12837: Heap buffer overflow in regular expression compiler Package: src:perl; Maintainer for src:perl is Niko Tyni <ntyni@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 12 Sep 2017 13:33:02 UTC Severity: grave Tags: patch, security, upstre ...
A heap write buffer overflow was found in perl's S_regatom() function, which is used in the compilation of regular expressions, resulting in the crash of the perl interpreter An attacker, able to provide a specially crafted regular expression, could cause a denial of service ...