Lucene search

K
cve[email protected]CVE-2004-2022
HistoryMay 10, 2005 - 4:00 a.m.

CVE-2004-2022

2005-05-1004:00:00
web.nvd.nist.gov
21
cve-2004-2022
activeperl
larry wall's perl
windows
denial of service
arbitrary code
buffer overflow

8.1 High

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

57.4%

ActivePerl 5.8.x and others, and Larry Wall’s Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.

Affected configurations

NVD
Node
activestateactiveperlMatch5.6.1
OR
activestateactiveperlMatch5.6.1.630
OR
activestateactiveperlMatch5.6.2
OR
activestateactiveperlMatch5.6.3
OR
activestateactiveperlMatch5.7.1
OR
activestateactiveperlMatch5.7.2
OR
activestateactiveperlMatch5.7.3
OR
activestateactiveperlMatch5.8

8.1 High

AI Score

Confidence

High

2.1 Low

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

57.4%

Related for CVE-2004-2022