First published: Thu Apr 08 2010(Updated: )
Bruce Merry reported: [1] <a href="http://bugs.gentoo.org/show_bug.cgi?id=313565">http://bugs.gentoo.org/show_bug.cgi?id=313565</a> an integer overflow, leading to stack overflow in the way Perl regular expression engine processed certain regular expression(s). Remote attacker could use this flaw to cause a denial of service (crash of an application, using the Perl regular expression engine). Public PoC from [1]: -------------------- perl -e 'if ((("a " x 100000) . "a\n") =~ /\A\S+(?: \S+)*\n\z/) {}'
Affected Software | Affected Version | How to fix |
---|---|---|
Perl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-580605 is considered high due to the potential for remote attackers to exploit the vulnerability.
You can fix REDHAT-BUG-580605 by updating to the latest patched version of Perl that addresses the integer overflow issue.
The vulnerability REDHAT-BUG-580605 was reported by Bruce Merry.
REDHAT-BUG-580605 is classified as an integer overflow vulnerability leading to a stack overflow in the Perl regular expression engine.
The impact of REDHAT-BUG-580605 on affected systems includes the potential for remote code execution through crafted regular expressions.