Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-10543

Опубликовано: 05 июн. 2020
Источник: debian
EPSS Низкий

Описание

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
perlfixed5.30.3-1package
perlfixed5.28.1-6+deb10u1busterpackage
perlfixed5.24.1-3+deb9u7stretchpackage

Примечания

  • https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed (v5.30.3)

EPSS

Процентиль: 88%
0.03944
Низкий

Связанные уязвимости

CVSS3: 8.2
ubuntu
больше 5 лет назад

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. An application written in Perl would only be vulnerable to this flaw if it evaluates regular expressions supplied by the attacker. Evaluating regular expressions in this fashion is known to be dangerous since the regular expression engine does not protect against denial of service attacks in this usage scenario. Additionally, the target system needs a sufficient amount of memory to allocate partial expansions of the nested quantifiers prior to the overflow occurring. This requirement is unlikely to be met on 64bit systems.]

CVSS3: 8.2
redhat
больше 5 лет назад

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.

CVSS3: 8.2
nvd
больше 5 лет назад

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.

CVSS3: 8.2
fstec
больше 5 лет назад

Уязвимость интерпретатора языка программирования Perl, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

rocky
больше 4 лет назад

Moderate: perl security and bug fix update

EPSS

Процентиль: 88%
0.03944
Низкий