(Oracle Issues Fix for Solaris) Perl Bug in Rehash Mechanism Lets Remote Users Deny Service
|
SecurityTracker Alert ID: 1028526 |
SecurityTracker URL: https://securitytracker.com/id/1028526
|
CVE Reference:
CVE-2013-1667
(Links to External Site)
|
Date: May 8 2013
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 5.8.2 to 5.16.x
|
Description:
A vulnerability was reported in Perl. A remote user can cause denial of service conditions.
A remote user can send specially crafted data to cause the target Perl application to consume excessive memory and crash. Applications that provide arbitrary user-supplied data as input to hash keys are affected.
Yves Orton reported this vulnerability.
|
Impact:
A remote user can cause the target Perl application to consume excessive memory and crash.
|
Solution:
Oracle has issued a fix for Solaris.
The Oracle advisory is available at:
https://blogs.oracle.com/sunsecurity/entry/cve_2013_1667_denial_of
|
Vendor URL: perl.org/ (Links to External Site)
|
Cause:
State error
|
Underlying OS: UNIX (Solaris - SunOS)
|
Underlying OS Comments: 10, 11.1
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|