Vulnerability Name:

CVE-2004-0377 (CCN-15732)

Assigned:2004-04-05
Published:2004-04-05
Updated:2017-07-11
Summary:Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-0377

Source: FULLDISC
Type: Patch, Vendor Advisory
20040405 iDEFENSE Security Advisory 04.05.04: Perl win32_stat Function

Source: BUGTRAQ
Type: UNKNOWN
20040405 [Full-Disclosure] iDEFENSE Security Advisory 04.05.04: Perl win32_stat Function

Source: CONFIRM
Type: UNKNOWN
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552

Source: CCN
Type: ActiveState Web site
Index of /gsar/APC

Source: CCN
Type: CIAC Information Bulletin O-130
Perl and ActivePerl win32_stat Buffer Overflow

Source: MISC
Type: UNKNOWN
http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities

Source: CCN
Type: iDEFENSE Security Advisory 04.05.04
Perl win32_stat Function Buffer Overflow Vulnerability

Source: CCN
Type: US-CERT VU#722414
Perl vulnerable to buffer overflow in win32_stat()

Source: CERT-VN
Type: Patch, Third Party Advisory, US Government Resource
VU#722414

Source: CCN
Type: OSVDB ID: 4960
Perl / ActivePerl win32_stat Function Overflow

Source: CCN
Type: BID-10050
Perl win32_stat function Remote Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
perl-win32stat-bo(15732)

Source: XF
Type: UNKNOWN
perl-win32stat-bo(15732)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:activestate:activeperl:*:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:*:*:*:*:*:*:*:* (Version <= 5.8.3)

  • Configuration CCN 1:
  • cpe:/a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:activestate:activeperl:5.8:*:*:*:*:*:*:*
  • OR cpe:/a:activestate:activeperl:5.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:activestate:activeperl:5.8.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    activestate activeperl *
    larry_wall perl *
    larry_wall perl 5.8.0
    larry_wall perl 5.8.3
    larry_wall perl 5.8.1
    activestate activeperl 5.8
    activestate activeperl 5.8.1
    activestate activeperl 5.8.3