An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
http://www.securitytracker.com/id/1040681
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2018:1192
https://rt.perl.org/Public/Bug/Display.html?id=132227
https://security.gentoo.org/glsa/201909-01
https://usn.ubuntu.com/3625-1/
Source: MITRE
Published: 2018-04-17
Updated: 2020-08-24
Type: CWE-787
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL
OR
OR
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* versions from 5.18 to 5.26 (inclusive)
OR
OR
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
131491 | EulerOS Virtualization for ARM 64 3.0.3.0 : perl (EulerOS-SA-2019-2326) | Nessus | Huawei Local Security Checks | high |
128590 | GLSA-201909-01 : Perl: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | high |
700517 | macOS 10.13.x < 10.13.6 Multiple Vulnerabilities | Nessus Network Monitor | Operating System Detection | critical |
121950 | Photon OS 2.0: Perl PHSA-2018-2.0-0050 | Nessus | PhotonOS Local Security Checks | high |
121865 | Photon OS 1.0: Perl PHSA-2018-1.0-0167 | Nessus | PhotonOS Local Security Checks | high |
120813 | Fedora 28 : 4:perl (2018-d1ba58394e) | Nessus | Fedora Local Security Checks | high |
118573 | macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-005) | Nessus | MacOS X Local Security Checks | critical |
118275 | SUSE SLES12 Security Update : perl (SUSE-SU-2018:1972-2) | Nessus | SuSE Local Security Checks | high |
111946 | Photon OS 1.0: Blktrace / Libmspack / Ntp / Openjdk / Perl / Systemd / Vim PHSA-2018-1.0-0167 (deprecated) | Nessus | PhotonOS Local Security Checks | high |
111305 | Photon OS 2.0 : perl / libmspack / zsh (PhotonOS-PHSA-2018-2.0-0050) (deprecated) | Nessus | PhotonOS Local Security Checks | high |
111150 | SUSE SLED12 / SLES12 Security Update : perl (SUSE-SU-2018:1972-1) | Nessus | SuSE Local Security Checks | high |
111137 | macOS 10.13.x < 10.13.6 Multiple Vulnerabilities | Nessus | MacOS X Local Security Checks | critical |
111136 | macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-004) | Nessus | MacOS X Local Security Checks | critical |
109385 | openSUSE Security Update : perl (openSUSE-2018-400) | Nessus | SuSE Local Security Checks | high |
109356 | SUSE SLED12 / SLES12 Security Update : perl (SUSE-SU-2018:1074-1) | Nessus | SuSE Local Security Checks | high |
109350 | Fedora 26 : 1:perl-Module-CoreList / 4:perl (2018-0050f7c0d1) | Nessus | Fedora Local Security Checks | high |
109221 | Fedora 27 : 1:perl-Module-CoreList / 4:perl (2018-1c8b49fbc7) | Nessus | Fedora Local Security Checks | high |
109086 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : Perl vulnerabilities (USN-3625-1) | Nessus | Ubuntu Local Security Checks | high |
109051 | FreeBSD : perl -- multiple vulnerabilities (41c96ffd-29a6-4dcc-9a88-65f5038fa6eb) | Nessus | FreeBSD Local Security Checks | high |
109047 | Debian DSA-4172-1 : perl - security update | Nessus | Debian Local Security Checks | high |