First published: Tue Apr 17 2018(Updated: )
Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Perl Perl | <5.26.2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Apple macOS High Sierra | <10.13.6 | 10.13.6 |
Apple Sierra | ||
Apple El Capitan | ||
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IQ Centralized Management | >=8.2.0<=8.3.0 | |
debian/perl | 5.32.1-4+deb11u3 5.32.1-4+deb11u1 5.36.0-7+deb12u1 5.38.2-5 5.40.0-6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-6913 is a vulnerability in Perl that allows attackers to execute arbitrary code through a heap-based buffer overflow in the pack function.
CVE-2018-6913 is classified as critical with a severity rating of 9.8.
Perl versions before 5.26.2 are affected by CVE-2018-6913.
To fix CVE-2018-6913, update Perl to version 5.26.2 or later.
You can find more information about CVE-2018-6913 on the MITRE CVE database and the Ubuntu security notices.