Lucene search

K
ubuntucveUbuntu.comUB:CVE-2010-4777
HistoryFeb 10, 2014 - 12:00 a.m.

CVE-2010-4777

2014-02-1000:00:00
ubuntu.com
ubuntu.com
12

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.005

Percentile

77.2%

The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0,
and other versions, when running with debugging enabled, allows
context-dependent attackers to cause a denial of service (assertion failure
and application exit) via crafted input that is not properly handled when
using certain regular expressions, as demonstrated by causing SpamAssassin
and OCSInventory to crash.

Bugs

Notes

Author Note
jdstrand per Debian, perl-debug only

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.005

Percentile

77.2%