Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 03:14
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-06-05 14:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-10878
Mitre link : CVE-2020-10878
CVE.ORG link : CVE-2020-10878
JSON object : View
Products Affected
oracle
- communications_pricing_design_center
- communications_diameter_signaling_router
- communications_eagle_application_processor
- communications_offline_mediation_controller
- communications_billing_and_revenue_management
- communications_eagle_lnp_application_processor
- communications_performance_intelligence_center
- communications_lsms
- enterprise_manager_base_platform
- sd-wan_aware
- tekelec_platform_distribution
- configuration_manager
opensuse
- leap
fedoraproject
- fedora
perl
- perl
netapp
- snap_creator_framework
- oncommand_workflow_automation
CWE
CWE-190
Integer Overflow or Wraparound