SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   



Category:   Application (Generic)  >   Perl Vendors:   Wall, Larry
Perl Functions May Crash When Supplied an Incorrect Number of Parameters
SecurityTracker Alert ID:  1025507
SecurityTracker URL:  https://securitytracker.com/id/1025507
CVE Reference:   CVE-2011-0761   (Links to External Site)
Date:  May 10 2011
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 5.10.0 - 5.12.0
Description:   A vulnerability was reported in Perl. A remote or local user can cause denial of service conditions.

A user can send an incorrect number of parameters to certain functions to trigger a segmentation fault. A remote or local user can exploit this in certain cases to cause denial of service conditions.

The following functions are affected:

getpeername()
readdir()
closedir()
getsockname()
readdir()
rewinddir()
tell()
telldir()

The vendor was notified on February 10, 2011.

Jonathan Brossard from Toucan System reported this vulnerability.

Impact:   A remote or local user can cause denial of service conditions.
Solution:   The vendor has issued a fix (5.12.0).
Vendor URL:  perl.org/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  TSSA-2011-03 - Perl : multiple functions null pointer dereference uppon parameters injection


[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search


Content previously copyright SecurityGlobal.net LLC placed in the public domain on December 31, 2019.