8.1 High
AI Score
Confidence
High
2.1 Low
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
57.4%
ActivePerl 5.8.x and others, and Larry Wall’s Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html
marc.info/?l=bugtraq&m=108489894009025&w=2
marc.info/?l=full-disclosure&m=108482796105922&w=2
marc.info/?l=full-disclosure&m=108483058514596&w=2
marc.info/?l=full-disclosure&m=108489112131099&w=2
www.oliverkarow.de/research/ActivePerlSystemBOF.txt
www.perlmonks.org/index.pl?node_id=354145
www.securityfocus.com/bid/10375
exchange.xforce.ibmcloud.com/vulnerabilities/16169