First published: Tue Apr 06 2004(Updated: )
Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ActiveState ActivePerl | ||
Perl | <=5.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0377 has a high severity rating due to its ability to allow arbitrary command execution.
To fix CVE-2004-0377, upgrade ActiveState's ActivePerl to version 5.8.3 or later, or update Larry Wall's Perl to a version above 5.8.3.
CVE-2004-0377 affects users of ActiveState's ActivePerl and versions of Perl before 5.8.3.
CVE-2004-0377 facilitates both local and remote attacks through buffer overflow vulnerabilities.
The impact of CVE-2004-0377 includes the potential for attackers to execute arbitrary commands on the affected systems.