Summary
Detail | |||
---|---|---|---|
Vendor | Perl | First view | 1999-12-31 |
Product | Perl | Last view | 2024-01-02 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2024-01-02 | CVE-2023-47039 | A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations. |
7.8 | 2023-12-18 | CVE-2023-47038 | A vulnerability was found in perl. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer. |
9.8 | 2023-12-02 | CVE-2023-47100 | In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0. |
9.8 | 2023-08-22 | CVE-2022-48522 | In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation. |
8.1 | 2023-04-29 | CVE-2023-31486 | HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates. |
8.1 | 2023-04-29 | CVE-2023-31484 | CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS. |
7.8 | 2021-08-11 | CVE-2021-36770 | Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value. |
7.5 | 2020-06-05 | CVE-2020-12723 | regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. |
8.6 | 2020-06-05 | CVE-2020-10878 | Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection. |
8.2 | 2020-06-05 | CVE-2020-10543 | Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. |
9.8 | 2018-12-07 | CVE-2018-18314 | Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations. |
9.1 | 2018-12-07 | CVE-2018-18313 | Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory. |
9.8 | 2018-12-07 | CVE-2018-18311 | Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations. |
9.8 | 2018-12-05 | CVE-2018-18312 | Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations. |
7.5 | 2018-06-07 | CVE-2018-12015 | In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name. |
9.8 | 2018-04-17 | CVE-2018-6913 | Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count. |
7.5 | 2018-04-17 | CVE-2018-6798 | An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure. |
9.8 | 2018-04-17 | CVE-2018-6797 | An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written. |
9.8 | 2017-09-27 | CVE-2017-12814 | Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable. |
9.1 | 2017-09-19 | CVE-2017-12883 | Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape. |
7.5 | 2017-09-19 | CVE-2017-12837 | Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier. |
9.8 | 2017-02-07 | CVE-2015-8608 | The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument. |
7.8 | 2016-08-02 | CVE-2016-6185 | The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory. |
7.8 | 2016-08-02 | CVE-2016-1238 | (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory. |
7.5 | 2016-05-25 | CVE-2015-8853 | The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
16% (7) | CWE-787 | Out-of-bounds Write |
16% (7) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
9% (4) | CWE-264 | Permissions, Privileges, and Access Controls |
9% (4) | CWE-189 | Numeric Errors |
7% (3) | CWE-190 | Integer Overflow or Wraparound |
7% (3) | CWE-125 | Out-of-bounds Read |
7% (3) | CWE-20 | Improper Input Validation |
4% (2) | CWE-399 | Resource Management Errors |
4% (2) | CWE-295 | Certificate Issues |
4% (2) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
2% (1) | CWE-755 | Improper Handling of Exceptional Conditions |
2% (1) | CWE-427 | Uncontrolled Search Path Element |
2% (1) | CWE-134 | Uncontrolled Format String |
2% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
2% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-27 | Leveraging Race Conditions via Symbolic Links |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:1074 | Perl Format String Integer Overflow Vulnerability |
oval:org.mitre.oval:def:10598 | Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Per... |
oval:org.mitre.oval:def:8071 | DSA-1556 perl -- heap buffer overflow |
oval:org.mitre.oval:def:20069 | DSA-1556-2 perl - denial of service |
oval:org.mitre.oval:def:10579 | Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to... |
oval:org.mitre.oval:def:22433 | ELSA-2008:0522: perl security update (Important) |
oval:org.mitre.oval:def:21868 | RHSA-2011:0558: perl security and bug fix update (Moderate) |
oval:org.mitre.oval:def:13932 | USN-1129-1 -- perl vulnerabilities |
oval:org.mitre.oval:def:13047 | DSA-2265-1 perl -- lack of tainted flag propagation |
oval:org.mitre.oval:def:23460 | ELSA-2011:0558: perl security and bug fix update (Moderate) |
oval:org.mitre.oval:def:27690 | DEPRECATED: ELSA-2011-0558 -- perl security and bug fix update (moderate) |
oval:org.mitre.oval:def:21318 | RHSA-2012:1116: perl-DBD-Pg security update (Moderate) |
oval:org.mitre.oval:def:15390 | DSA-2431-1 libdbd-pg-perl -- format string vulnerabilities |
oval:org.mitre.oval:def:23752 | ELSA-2012:1116: perl-DBD-Pg security update (Moderate) |
oval:org.mitre.oval:def:23007 | DEPRECATED: ELSA-2012:1116: perl-DBD-Pg security update (Moderate) |
oval:org.mitre.oval:def:27876 | DEPRECATED: ELSA-2012-1116 -- perl-DBD-Pg security update (moderate) |
oval:org.mitre.oval:def:22490 | USN-2099-1 -- perl vulnerability |
oval:org.mitre.oval:def:24564 | Security vulnerability in Perl for AIX |
oval:org.mitre.oval:def:26263 | SUSE-SU-2013:0441-1 -- Security update for Perl |
oval:org.mitre.oval:def:26050 | SUSE-SU-2013:0442-1 -- Security update for Perl |
oval:org.mitre.oval:def:27634 | DEPRECATED: ELSA-2013-0685 -- perl security update (moderate) |
oval:org.mitre.oval:def:20994 | RHSA-2013:0685: perl security update (Moderate) |
oval:org.mitre.oval:def:20945 | Security vulnerabilities in Perl for AIX |
oval:org.mitre.oval:def:20923 | DEPRECATED: Security vulnerabilities in Perl for AIX |
oval:org.mitre.oval:def:18771 | HP-UX running perl, Remote Denial of Service (DoS) |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
76724 | Perl Encode decode_xs() Function Input Parsing Remote Overflow |
76723 | Perl File::Glob::bsd_glob() Function GLOB_ALTDIRFUNC Flag Handling Remote Cod... |
75047 | Perl Multiple Function Taint Protection Mechanism Bypass |
74745 | Perl regcomp.c Perl_reg_numbered_buff_fetch Function DoS |
74175 | Perl Multiple Function Call Argument Injection NULL Dereference DoS |
72962 | Perl Data::FormValidator Module D::F::Results Field Validation Bypass |
64082 | Perl RegEx String Handling Overflow DoS |
59283 | Perl Interpreter RegEx UTF-8 Character Handling DoS |
46563 | Perl File::Path::rmtree lib/File/Path.pm Symlink Arbitrary File chmod |
44588 | Perl UTF8 Character Handling Double-free DoS |
22255 | OpenBSD Perl Interpreter sprintf Function Local Overflow |
21345 | Perl Explicit Format Parameter Index Overflow |
8067 | Perl -e Option Symlink Arbitrary File Overwrite |
ExploitDB Exploits
id | Description |
---|---|
23579 | TWiki MAKETEXT Remote Command Execution |
OpenVAS Exploits
id | Description |
---|---|
2013-09-18 | Name : Debian Security Advisory DSA 2586-1 (perl - several vulnerabilities) File : nvt/deb_2586_1.nasl |
2012-12-27 | Name : TWiki 'MAKETEXT' variable Remote Command Execution Vulnerability File : nvt/gb_twiki_maketext_rce_vuln.nasl |
2012-12-18 | Name : Fedora Update for perl FEDORA-2012-18330 File : nvt/gb_fedora_2012_18330_perl_fc16.nasl |
2012-12-04 | Name : Ubuntu Update for perl USN-1643-1 File : nvt/gb_ubuntu_USN_1643_1.nasl |
2012-08-30 | Name : Fedora Update for perl-DBD-Pg FEDORA-2012-10892 File : nvt/gb_fedora_2012_10892_perl-DBD-Pg_fc17.nasl |
2012-08-03 | Name : Fedora Update for perl-DBD-Pg FEDORA-2012-10871 File : nvt/gb_fedora_2012_10871_perl-DBD-Pg_fc16.nasl |
2012-07-30 | Name : CentOS Update for perl-DBD-Pg CESA-2012:1116 centos5 File : nvt/gb_CESA-2012_1116_perl-DBD-Pg_centos5.nasl |
2012-07-30 | Name : CentOS Update for perl-DBD-Pg CESA-2012:1116 centos6 File : nvt/gb_CESA-2012_1116_perl-DBD-Pg_centos6.nasl |
2012-07-30 | Name : Mandriva Update for perl-DBD-Pg MDVSA-2012:112 (perl-DBD-Pg) File : nvt/gb_mandriva_MDVSA_2012_112.nasl |
2012-07-26 | Name : RedHat Update for perl-DBD-Pg RHSA-2012:1116-01 File : nvt/gb_RHSA-2012_1116-01_perl-DBD-Pg.nasl |
2012-07-09 | Name : RedHat Update for perl RHSA-2011:0558-01 File : nvt/gb_RHSA-2011_0558-01_perl.nasl |
2012-07-09 | Name : RedHat Update for perl RHSA-2011:1424-01 File : nvt/gb_RHSA-2011_1424-01_perl.nasl |
2012-04-30 | Name : Debian Security Advisory DSA 2431-1 (libdbd-pg-perl) File : nvt/deb_2431_1.nasl |
2012-04-30 | Name : Gentoo Security Advisory GLSA 201204-08 (DBD-Pg) File : nvt/glsa_201204_08.nasl |
2012-04-02 | Name : Fedora Update for perl-Data-FormValidator FEDORA-2011-11680 File : nvt/gb_fedora_2011_11680_perl-Data-FormValidator_fc16.nasl |
2012-01-20 | Name : Mandriva Update for perl MDVSA-2012:008 (perl) File : nvt/gb_mandriva_MDVSA_2012_008.nasl |
2012-01-17 | Name : Strawberry Perl Modules Multiple Vulnerabilities (Windows) File : nvt/gb_perl_modules_mult_vuln_win.nasl |
2011-11-03 | Name : Fedora Update for perl FEDORA-2011-13874 File : nvt/gb_fedora_2011_13874_perl_fc14.nasl |
2011-09-12 | Name : Fedora Update for perl-Data-FormValidator FEDORA-2011-11805 File : nvt/gb_fedora_2011_11805_perl-Data-FormValidator_fc14.nasl |
2011-09-12 | Name : Fedora Update for perl-Data-FormValidator FEDORA-2011-11756 File : nvt/gb_fedora_2011_11756_perl-Data-FormValidator_fc15.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2265-1 (perl) File : nvt/deb_2265_1.nasl |
2011-05-23 | Name : Mandriva Update for perl MDVSA-2011:091 (perl) File : nvt/gb_mandriva_MDVSA_2011_091.nasl |
2011-05-23 | Name : Perl Denial of Service Vulnerability (Windows) File : nvt/gb_perl_dos_vuln_win.nasl |
2011-05-10 | Name : Ubuntu Update for perl USN-1129-1 File : nvt/gb_ubuntu_USN_1129_1.nasl |
2011-04-29 | Name : Fedora Update for perl FEDORA-2011-4918 File : nvt/gb_fedora_2011_4918_perl_fc13.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0199 | Multiple Vulnerabilities in Apple Mac OS X Severity: Category I - VMSKEY: V0061337 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Foswiki/Twiki MAKETEXT command execution attempt RuleID : 26906 - Type : SERVER-OTHER - Revision : 3 |
2014-01-10 | FosWiki and TWiki MAKETEXT macro memory consumption denial of service attempt RuleID : 26905 - Type : SERVER-WEBAPP - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-4e088b6d7c.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9dbe983805.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-ca03363d57.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-d1ba58394e.nasl - Type: ACT_GATHER_INFO |
2018-12-17 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201812-07.nasl - Type: ACT_GATHER_INFO |
2018-12-01 | Name: The remote Debian host is missing a security update. File: debian_DLA-1601.nasl - Type: ACT_GATHER_INFO |
2018-11-30 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4347.nasl - Type: ACT_GATHER_INFO |
2018-11-14 | Name: The remote Debian host is missing a security update. File: debian_DLA-1578.nasl - Type: ACT_GATHER_INFO |
2018-10-31 | Name: The remote host is missing a macOS or Mac OS X security update that fixes mul... File: macosx_SecUpd2018-005.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1307.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1308.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_613193a0c1b411e8ae2d54e1ad3d6335.nasl - Type: ACT_GATHER_INFO |
2018-08-21 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0084.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0037.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0167.nasl - Type: ACT_GATHER_INFO |
2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0050.nasl - Type: ACT_GATHER_INFO |
2018-07-17 | Name: The remote host is missing a macOS update that fixes multiple security vulner... File: macos_10_13_6.nasl - Type: ACT_GATHER_INFO |
2018-07-17 | Name: The remote host is missing a macOS or Mac OS X security update that fixes mul... File: macosx_SecUpd2018-004.nasl - Type: ACT_GATHER_INFO |
2018-06-19 | Name: The remote Fedora host is missing a security update. File: fedora_2018-10ae521efa.nasl - Type: ACT_GATHER_INFO |
2018-06-12 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4226.nasl - Type: ACT_GATHER_INFO |
2018-04-26 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2018-0050f7c0d1.nasl - Type: ACT_GATHER_INFO |
2018-04-23 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2018-1c8b49fbc7.nasl - Type: ACT_GATHER_INFO |
2018-04-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1345.nasl - Type: ACT_GATHER_INFO |
2018-04-16 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4172.nasl - Type: ACT_GATHER_INFO |
2018-04-16 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_41c96ffd29a64dcc9a8865f5038fa6eb.nasl - Type: ACT_GATHER_INFO |