Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-18312
HistoryNov 29, 2018 - 12:00 a.m.

CVE-2018-18312

2018-11-2900:00:00
ubuntu.com
ubuntu.com
8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.5%

Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a
crafted regular expression that triggers invalid write operations.

Bugs

Notes

Author Note
upstream 5.18 - 5.28
mdeslaur looks to me like this was introduced by: https://perl5.git.perl.org/perl.git/commit/6798c95dd27b33efd71f394c18649af7bbaf42b7 trusty doesn’t look affected
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchperl< 5.26.1-6ubuntu0.3UNKNOWN
ubuntu18.10noarchperl< 5.26.2-7ubuntu0.1UNKNOWN
ubuntu16.04noarchperl< 5.22.1-9ubuntu0.6UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.5%