Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-2022

Overview

Vulnerability Score 2.1 2.1
CVE Id CVE-2004-2022
Last Modified 05 Sep 2008 04:42:59
Published 31 Dec 2004 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2004-2022

Summary

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.

Vulnerable Systems

Application

  • Activestate Activeperl 5.6.1

  • Activestate Activeperl 5.6.1.630

  • Activestate Activeperl 5.6.2

  • Activestate Activeperl 5.6.3

  • Activestate Activeperl 5.7.1

  • Activestate Activeperl 5.7.2

  • Activestate Activeperl 5.7.3

  • Activestate Activeperl 5.8


References

XF - perl-system-bo(16169)

BID - 10375

MISC - http://www.perlmonks.org/index.pl?node_id=354145

MISC - http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt

FULLDISC - 20040518 Re: Buffer Overflow in ActivePerl ?

FULLDISC - 20040517 RE: Buffer Overflow in ActivePerl ?

FULLDISC - 20040517 Buffer Overflow in ActivePerl ?

BUGTRAQ - 20040518 RE: [Full-Disclosure] Re: Buffer Overflow in ActivePerl ?

FULLDISC - 20040518 Re[2]: [Full-Disclosure] Buffer Overflow in ActivePerl ?


Last Updated: 27 May 2016 10:39:17