First published: Mon Feb 18 2013(Updated: )
A denial of service flaw was found in the way Perl's rehashing code implementation (responsible for recalculation of hash keys and redistribution of hash content) used to react on certain user's input. If a Perl language based application accepted untrusted user input as hash keys, an attacker could use this flaw to cause the perl executable to consume excessive amount of memory (a denial of service via memory exhaustion). References: [1] <a href="http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html">http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Perl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.