CVE-2007-5116

HIGH

Description

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

References

ftp://aix.software.ibm.com/aix/efixes/security/README

http://docs.info.apple.com/article.html?artnum=307179

http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html

http://lists.vmware.com/pipermail/security-announce/2008/000002.html

http://marc.info/?l=bugtraq&m=120352263023774&w=2

http://secunia.com/advisories/27479

http://secunia.com/advisories/27515

http://secunia.com/advisories/27531

http://secunia.com/advisories/27546

http://secunia.com/advisories/27548

http://secunia.com/advisories/27570

http://secunia.com/advisories/27613

http://secunia.com/advisories/27756

http://secunia.com/advisories/27936

http://secunia.com/advisories/28167

http://secunia.com/advisories/28368

http://secunia.com/advisories/28387

http://secunia.com/advisories/28993

http://secunia.com/advisories/29074

http://secunia.com/advisories/31208

http://securitytracker.com/id?1018899

http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1

http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1

http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1

http://support.avaya.com/elmodocs2/security/ASA-2008-014.htm

http://www.debian.org/security/2007/dsa-1400

http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml

http://www.ipcop.org/index.php?name=News&file=article&sid=41

http://www.mandriva.com/security/advisories?name=MDKSA-2007:207

http://www.novell.com/linux/security/advisories/2007_24_sr.html

http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html

http://www.redhat.com/support/errata/RHSA-2007-0966.html

http://www.redhat.com/support/errata/RHSA-2007-1011.html

http://www.securityfocus.com/archive/1/483563/100/0/threaded

http://www.securityfocus.com/archive/1/483584/100/0/threaded

http://www.securityfocus.com/archive/1/485936/100/0/threaded

http://www.securityfocus.com/archive/1/486859/100/0/threaded

http://www.securityfocus.com/bid/26350

http://www.ubuntu.com/usn/usn-552-1

http://www.us-cert.gov/cas/techalerts/TA07-352A.html

http://www.vmware.com/security/advisories/VMSA-2008-0001.html

http://www.vupen.com/english/advisories/2007/3724

http://www.vupen.com/english/advisories/2007/4238

http://www.vupen.com/english/advisories/2007/4255

http://www.vupen.com/english/advisories/2008/0064

http://www.vupen.com/english/advisories/2008/0641

http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220

http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244

https://bugzilla.redhat.com/show_bug.cgi?id=323571

https://bugzilla.redhat.com/show_bug.cgi?id=378131

https://exchange.xforce.ibmcloud.com/vulnerabilities/38270

https://issues.rpath.com/browse/RPL-1813

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669

Details

Source: MITRE

Published: 2007-11-07

Updated: 2018-10-15

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:s390:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:2008.0:*:x86_64:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:as:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:es:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:ws:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:5.0:*:client:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*

cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*

cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*

OR

cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*

cpe:2.3:a:larry_wall:perl:5.8.6:*:*:*:*:*:*:*

cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*

cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:1.0:*:application_stack:*:*:*:*:*

Tenable Plugins

View all (23 total)

IDNameProductFamilySeverity
79964GLSA-201412-11 : AMD64 x86 emulation base libraries: Multiple vulnerabilities (Heartbleed)NessusGentoo Local Security Checks
high
67586Oracle Linux 3 / 4 / 5 : perl (ELSA-2007-0966)NessusOracle Linux Local Security Checks
high
64309AIX 5.3 TL 5 : perl (IZ10244)NessusAIX Local Security Checks
high
60283Scientific Linux Security Update : perl on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
60282Scientific Linux Security Update : perl on SL4.x, SL3.x i386/x86_64NessusScientific Linux Local Security Checks
high
41165SuSE9 Security Update : perl (YOU Patch Number 11964)NessusSuSE Local Security Checks
high
40372VMSA-2008-0001 : Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packagesNessusVMware ESX Local Security Checks
high
37788CentOS 3 / 4 / 5 : perl (CESA-2007:0966)NessusCentOS Local Security Checks
high
33912Solaris 10 (x86) : 122240-03NessusSolaris Local Security Checks
high
33908Solaris 10 (sparc) : 122239-03NessusSolaris Local Security Checks
high
32241AIX 5.2 TL 10 : perl.rte (U815030)NessusAIX Local Security Checks
high
30933AIX 5.3 TL 6 : perl.rte (U814193)NessusAIX Local Security Checks
high
29723Mac OS X Multiple Vulnerabilities (Security Update 2007-009)NessusMacOS X Local Security Checks
critical
29550SuSE 10 Security Update : perl (ZYPP Patch Number 4665)NessusSuSE Local Security Checks
high
29237Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : perl vulnerability (USN-552-1)NessusUbuntu Local Security Checks
high
28286openSUSE 10 Security Update : perl (perl-4675)NessusSuSE Local Security Checks
high
28267GLSA-200711-28 : Perl: Buffer overflowNessusGentoo Local Security Checks
high
28191Fedora 7 : perl-5.8.8-26.fc7 (2007-3255)NessusFedora Local Security Checks
high
28188Fedora 8 : perl-5.8.8-31.fc8 (2007-3218)NessusFedora Local Security Checks
high
27813FreeBSD : perl -- regular expressions unicode data buffer overflow (5b47c279-8cb5-11dc-8878-0016179b2dd5)NessusFreeBSD Local Security Checks
high
27804Debian DSA-1400-1 : perl - heap overflowNessusDebian Local Security Checks
high
27644RHEL 3 / 4 / 5 : perl (RHSA-2007:0966)NessusRed Hat Local Security Checks
high
27642Mandrake Linux Security Advisory : perl (MDKSA-2007:207)NessusMandriva Local Security Checks
high