First published: Sat Dec 02 2023(Updated: )
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl Perl | >=5.30.0<5.38.2 | |
IBM AIX | <=7.3 | |
IBM VIOS | <=4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Perl vulnerability is CVE-2023-47100.
The severity of CVE-2023-47100 is critical with a severity value of 9.8.
The software versions affected by CVE-2023-47100 are Perl versions 5.30.0 through 5.38.2.
An attacker can exploit CVE-2023-47100 by using a crafted regular expression construct that includes a property name.
Yes, a fix is available for CVE-2023-47100. It is recommended to update to the latest version of Perl (5.38.2 or later) to mitigate the vulnerability.