CVE-2004-2022

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:activestate:activeperl:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:activestate:activeperl:5.6.1.630:*:*:*:*:*:*:*
cpe:2.3:a:activestate:activeperl:5.6.2:*:*:*:*:*:*:*
cpe:2.3:a:activestate:activeperl:5.6.3:*:*:*:*:*:*:*
cpe:2.3:a:activestate:activeperl:5.7.1:*:*:*:*:*:*:*
cpe:2.3:a:activestate:activeperl:5.7.2:*:*:*:*:*:*:*
cpe:2.3:a:activestate:activeperl:5.7.3:*:*:*:*:*:*:*
cpe:2.3:a:activestate:activeperl:5.8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-12-31 05:00

Updated : 2024-02-28 10:24


NVD link : CVE-2004-2022

Mitre link : CVE-2004-2022

CVE.ORG link : CVE-2004-2022


JSON object : View

Products Affected

activestate

  • activeperl