CVE-2014-4330

The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0406.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html Exploit
http://seclists.org/fulldisclosure/2014/Sep/84 Exploit
http://seclists.org/oss-sec/2014/q3/692 Exploit
http://secunia.com/advisories/61441
http://secunia.com/advisories/61961
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
http://www.securityfocus.com/archive/1/533543/100/0/threaded
http://www.securityfocus.com/bid/70142
http://www.ubuntu.com/usn/USN-2916-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://metacpan.org/pod/distribution/Data-Dumper/Changes
https://www.lsexperts.de/advisories/lse-2014-06-10.txt Exploit
http://advisories.mageia.org/MGASA-2014-0406.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html Exploit
http://seclists.org/fulldisclosure/2014/Sep/84 Exploit
http://seclists.org/oss-sec/2014/q3/692 Exploit
http://secunia.com/advisories/61441
http://secunia.com/advisories/61961
http://www.mandriva.com/security/advisories?name=MDVSA-2015:136
http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
http://www.securityfocus.com/archive/1/533543/100/0/threaded
http://www.securityfocus.com/bid/70142
http://www.ubuntu.com/usn/USN-2916-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://metacpan.org/pod/distribution/Data-Dumper/Changes
https://www.lsexperts.de/advisories/lse-2014-06-10.txt Exploit
Configurations

Configuration 1 (hide)

cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:data_dumper_project:data_dumper:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:09

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0406.html - () http://advisories.mageia.org/MGASA-2014-0406.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html -
References () http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html - Exploit () http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html - Exploit
References () http://seclists.org/fulldisclosure/2014/Sep/84 - Exploit () http://seclists.org/fulldisclosure/2014/Sep/84 - Exploit
References () http://seclists.org/oss-sec/2014/q3/692 - Exploit () http://seclists.org/oss-sec/2014/q3/692 - Exploit
References () http://secunia.com/advisories/61441 - () http://secunia.com/advisories/61441 -
References () http://secunia.com/advisories/61961 - () http://secunia.com/advisories/61961 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:136 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:136 -
References () http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html - () http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html -
References () http://www.securityfocus.com/archive/1/533543/100/0/threaded - () http://www.securityfocus.com/archive/1/533543/100/0/threaded -
References () http://www.securityfocus.com/bid/70142 - () http://www.securityfocus.com/bid/70142 -
References () http://www.ubuntu.com/usn/USN-2916-1 - () http://www.ubuntu.com/usn/USN-2916-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/96216 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/96216 -
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 - () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 -
References () https://metacpan.org/pod/distribution/Data-Dumper/Changes - () https://metacpan.org/pod/distribution/Data-Dumper/Changes -
References () https://www.lsexperts.de/advisories/lse-2014-06-10.txt - Exploit () https://www.lsexperts.de/advisories/lse-2014-06-10.txt - Exploit

Information

Published : 2014-09-30 16:55

Updated : 2024-11-21 02:09


NVD link : CVE-2014-4330

Mitre link : CVE-2014-4330

CVE.ORG link : CVE-2014-4330


JSON object : View

Products Affected

data_dumper_project

  • data_dumper

perl

  • perl
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer