First published: Thu Apr 08 2010(Updated: )
Bruce Merry reported: [1] <a href="http://bugs.gentoo.org/show_bug.cgi?id=313565">http://bugs.gentoo.org/show_bug.cgi?id=313565</a> an integer overflow, leading to stack overflow in the way Perl regular expression engine processed certain regular expression(s). Remote attacker could use this flaw to cause a denial of service (crash of an application, using the Perl regular expression engine). Public PoC from [1]: -------------------- perl -e 'if ((("a " x 100000) . "a\n") =~ /\A\S+(?: \S+)*\n\z/) {}'
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Perl Perl | =5.8.4 | |
Perl Perl | =5.8.1 | |
Perl Perl | =5.8.9 | |
Perl Perl | =5.8.2 | |
Perl Perl | =5.8.5 | |
Perl Perl | =5.8.7 | |
Perl Perl | =5.8.3 | |
Perl Perl | =5.8.6 | |
Perl Perl | =5.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.