First published: Thu May 29 1997(Updated: )
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | =5.3 | |
SGI Freeware | =1.0 | |
SGI Freeware | =2.0 | |
BSDI BSD/OS | =2.1 | |
BSDI BSD/OS | =3.0 | |
Red Hat Linux | =4.0 | |
Red Hat Linux | =4.1 | |
Red Hat Linux | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0034 has a severity rating that indicates significant risk due to a buffer overflow vulnerability.
To fix CVE-1999-0034, update Perl to a version that does not contain this vulnerability.
CVE-1999-0034 affects Perl 4.x and 5.x versions, particularly 5.3 and earlier.
The impact of CVE-1999-0034 includes potential unauthorized code execution due to the buffer overflow.
While CVE-1999-0034 is a historical vulnerability, it may still pose a risk in legacy systems using affected Perl versions.