ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html - | |
References | () http://marc.info/?l=bugtraq&m=108489894009025&w=2 - | |
References | () http://marc.info/?l=full-disclosure&m=108482796105922&w=2 - | |
References | () http://marc.info/?l=full-disclosure&m=108483058514596&w=2 - | |
References | () http://marc.info/?l=full-disclosure&m=108489112131099&w=2 - | |
References | () http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt - Exploit | |
References | () http://www.perlmonks.org/index.pl?node_id=354145 - Exploit | |
References | () http://www.securityfocus.com/bid/10375 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16169 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:52
NVD link : CVE-2004-2022
Mitre link : CVE-2004-2022
CVE.ORG link : CVE-2004-2022
JSON object : View
Products Affected
activestate
- activeperl
CWE