The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
References
Link | Resource |
---|---|
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | |
https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html | Exploit Third Party Advisory |
https://rt.perl.org/Public/Bug/Display.html?id=126755 | Exploit Issue Tracking Patch Vendor Advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | |
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | |
https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html | Exploit Third Party Advisory |
https://rt.perl.org/Public/Bug/Display.html?id=126755 | Exploit Issue Tracking Patch Vendor Advisory |
https://www.oracle.com/security-alerts/cpujul2020.html |
Configurations
History
21 Nov 2024, 02:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - | |
References | () https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html - Exploit, Third Party Advisory | |
References | () https://rt.perl.org/Public/Bug/Display.html?id=126755 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - |
Information
Published : 2017-02-07 15:59
Updated : 2024-11-21 02:38
NVD link : CVE-2015-8608
Mitre link : CVE-2015-8608
CVE.ORG link : CVE-2015-8608
JSON object : View
Products Affected
perl
- perl
CWE
CWE-125
Out-of-bounds Read