First published: Fri Sep 15 2017(Updated: )
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/perl | <5.24.3 | 5.24.3 |
redhat/perl | <5.26.1 | 5.26.1 |
redhat/perl | <5.27.4 | 5.27.4 |
Perl 5.30.0 | <=5.24.2 | |
Perl 5.30.0 | =5.26.0 |
https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12883 has a critical severity rating due to its ability to cause denial of service and potential information disclosure.
To fix CVE-2017-12883, upgrade Perl to version 5.24.3 or later, or to version 5.26.1 or later.
Perl versions prior to 5.24.3-RC1 and 5.26.1-RC1 are affected by CVE-2017-12883.
Yes, CVE-2017-12883 can be exploited remotely through crafted regular expressions containing invalid '\N{U+...}' escapes.
CVE-2017-12883 can lead to application crashes or disclosure of sensitive information.