First published: Thu Apr 30 2009(Updated: )
Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl Perl | ||
Cmu Dbd\ | =\-pg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.