First published: Fri May 13 2011(Updated: )
Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | =5.10.0 | |
Perl | =5.10.0-rc1 | |
Perl | =5.10.0-rc2 | |
Perl | =5.10.1 | |
Perl | =5.10.1-rc1 | |
Perl | =5.10.1-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0761 has a medium severity due to its ability to cause denial of service by application crash.
To fix CVE-2011-0761, you should update to Perl version 5.10.2 or later where the vulnerability has been patched.
CVE-2011-0761 affects Perl versions including 5.10.0, 5.10.0-rc1, 5.10.0-rc2, and 5.10.1 up to 5.10.1-rc2.
Yes, CVE-2011-0761 can be exploited by context-dependent attackers who can inject arguments into specific function calls.
CVE-2011-0761 involves a denial of service attack leading to a NULL pointer dereference and application crash.