Описание
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 5.8.7-10ubuntu1.1 |
devel | not-affected | |
edgy | released | 5.8.8-6ubuntu0.1 |
feisty | released | 5.8.8-7ubuntu0.1 |
gutsy | released | 5.8.8-7ubuntu3.1 |
upstream | released | 5.8.8-12 |
Показывать по
7.5 High
CVSS2
Связанные уязвимости
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Buffer overflow in the polymorphic opcode support in the Regular Expre ...
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
ELSA-2007-0966: Important: perl security update (IMPORTANT)
7.5 High
CVSS2