Описание
Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-infra-legacy/trusty | released | 5.18.2-2ubuntu1.1 |
| lucid | ignored | end of life |
| precise | released | 5.14.2-6ubuntu2.5 |
| trusty | released | 5.18.2-2ubuntu1.1 |
| trusty/esm | released | 5.18.2-2ubuntu1.1 |
| upstream | released | 5.20.0-1 |
| utopic | not-affected | 5.20.1-1 |
| vivid | not-affected | |
| vivid/stable-phone-overlay | not-affected |
Показывать по
7.5 High
CVSS2
Связанные уязвимости
Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.
Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.
Integer underflow in regcomp.c in Perl before 5.20, as used in Apple O ...
Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.
7.5 High
CVSS2