Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1158

Опубликовано: 06 апр. 2010
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.

Отчет

The Red Hat Product Security has rated this issue as having low security impact. The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, or 5.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=580605Perl: Stack overflow by processing a certain regular expression

EPSS

Процентиль: 67%
0.00556
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.

nvd
больше 15 лет назад

Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.

debian
больше 15 лет назад

Integer overflow in the regular expression engine in Perl 5.8.x allows ...

github
больше 3 лет назад

Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.

EPSS

Процентиль: 67%
0.00556
Низкий

4.3 Medium

CVSS2