First published: Mon Oct 08 2007(Updated: )
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =3.1 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =4.0 | |
Mandrake Linux | =2007 | |
Mandrake Linux | =2007 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2007.1 | |
Mandrake Linux | =2008.0 | |
Mandrake Linux | =2008.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Mandriva Linux Corporate Server | =3.0 | |
Mandriva Linux Corporate Server | =4.0 | |
Mandriva Linux Corporate Server | =4.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =5.0 | |
redhat enterprise Linux desktop | =3.0 | |
redhat enterprise Linux desktop | =4.0 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Red Hat Linux Advanced Workstation | =2.1 | |
Rpath Linux | =1 | |
Perl | =5.8.0 | |
Perl | =5.8.1 | |
Perl | =5.8.3 | |
Perl | =5.8.4 | |
Perl | =5.8.4.1 | |
Perl | =5.8.4.2 | |
Perl | =5.8.4.2.3 | |
Perl | =5.8.4.3 | |
Perl | =5.8.4.4 | |
Perl | =5.8.4.5 | |
Perl | =5.8.6 | |
Mandrakesoft Mandrake Multi Network Firewall | =2.0 | |
openpkg openpkg | =current | |
Red Hat Enterprise Linux | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5116 is classified as a critical vulnerability due to its potential to allow arbitrary code execution through a buffer overflow.
To remediate CVE-2007-5116, upgrade to a patched version of Perl that addresses this issue.
CVE-2007-5116 affects Perl versions 5.8.0 through 5.8.4.5.
Yes, CVE-2007-5116 can be exploited by context-dependent attackers remotely through crafted regular expressions.
Applications using vulnerable versions of Perl may be subject to arbitrary code execution, leading to potential data breaches or system compromise.