Описание
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
Ссылки
- Third Party AdvisoryVDB Entry
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- ExploitPatchVendor Advisory
- Third Party AdvisoryVDB Entry
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Одновременно
Одно из
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
Stack-based buffer overflow in the CPerlHost::Add method in win32/perl ...
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2