Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html - Patch, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=108118694327979&w=2 - | |
References | () http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 - | |
References | () http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities - | |
References | () http://www.kb.cert.org/vuls/id/722414 - Patch, Third Party Advisory, US Government Resource | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15732 - |
Information
Published : 2004-05-04 04:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0377
Mitre link : CVE-2004-0377
CVE.ORG link : CVE-2004-0377
JSON object : View
Products Affected
activestate
- activeperl
larry_wall
- perl
CWE