First published: Wed Sep 27 2017(Updated: )
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl 5.30.0 | <=5.24.2 | |
Perl 5.30.0 | =5.26.0 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12814 has a high severity due to its potential for allowing arbitrary code execution.
To fix CVE-2017-12814, upgrade Perl to version 5.24.3-RC1 or 5.26.1-RC1 or later.
CVE-2017-12814 affects Perl versions before 5.24.3-RC1 and 5.26.x versions before 5.26.1-RC1.
Exploiting CVE-2017-12814 can lead to arbitrary code execution on vulnerable Windows systems running affected Perl versions.
No, CVE-2017-12814 is a stack-based buffer overflow vulnerability, not an XSS vulnerability.