Vulnerability Name: | CVE-2004-0377 (CCN-15732) | ||||||||
Assigned: | 2004-04-05 | ||||||||
Published: | 2004-04-05 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2004-0377 Source: FULLDISC Type: Patch, Vendor Advisory 20040405 iDEFENSE Security Advisory 04.05.04: Perl win32_stat Function Source: BUGTRAQ Type: UNKNOWN 20040405 [Full-Disclosure] iDEFENSE Security Advisory 04.05.04: Perl win32_stat Function Source: CONFIRM Type: UNKNOWN http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 Source: CCN Type: ActiveState Web site Index of /gsar/APC Source: CCN Type: CIAC Information Bulletin O-130 Perl and ActivePerl win32_stat Buffer Overflow Source: MISC Type: UNKNOWN http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities Source: CCN Type: iDEFENSE Security Advisory 04.05.04 Perl win32_stat Function Buffer Overflow Vulnerability Source: CCN Type: US-CERT VU#722414 Perl vulnerable to buffer overflow in win32_stat() Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#722414 Source: CCN Type: OSVDB ID: 4960 Perl / ActivePerl win32_stat Function Overflow Source: CCN Type: BID-10050 Perl win32_stat function Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN perl-win32stat-bo(15732) Source: XF Type: UNKNOWN perl-win32stat-bo(15732) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |