6.4
CVSSv2

CVE-2017-12883

Published: 19/09/2017 Updated: 15/07/2020
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 571
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 prior to 5.24.3-RC1 and 5.26.x prior to 5.26.1-RC1 allows remote malicious users to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.

Vulnerable Product Search on Vulmon Subscribe to Product

perl perl 5.26.0

perl perl

Vendor Advisories

Debian Bug report logs - #875597 perl: CVE-2017-12883: Buffer over-read in regular expression parser Package: src:perl; Maintainer for src:perl is Niko Tyni <ntyni@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 12 Sep 2017 13:33:04 UTC Severity: grave Tags: patch, security, upstream Fo ...
Debian Bug report logs - #875596 perl: CVE-2017-12837: Heap buffer overflow in regular expression compiler Package: src:perl; Maintainer for src:perl is Niko Tyni <ntyni@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 12 Sep 2017 13:33:02 UTC Severity: grave Tags: patch, security, upstre ...
Perl could be made to crash if it received specially crafted input ...
Perl could be made to crash if it received specially crafted input ...
A heap buffer overread was found in perl's grok_bslash_N() function, which is used in the compilation of Unicode nodes in regular expressions, possibly leading to crash or dump of memory segments via the error output An attacker, able to provide a specially crafted regular expression, could look for sensible information in the error message, or cr ...
A heap buffer overread was found in perl's grok_bslash_N() function, which is used in the compilation of Unicode nodes in regular expressions, possibly leading to crash or dump of memory segments via the error output An attacker, able to provide a specially crafted regular expression, could look for sensible information in the error message, or cr ...