Описание
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-infra-legacy/trusty | not-affected | |
| esm-infra/xenial | not-affected | |
| precise/esm | not-affected | |
| trusty | not-affected | |
| trusty/esm | not-affected | |
| upstream | needs-triage | |
| vivid/ubuntu-core | not-affected | |
| xenial | not-affected | |
| zesty | not-affected |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
Stack-based buffer overflow in the CPerlHost::Add method in win32/perl ...
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
7.5 High
CVSS2
9.8 Critical
CVSS3