Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-10878
HistoryJun 01, 2020 - 12:00 a.m.

CVE-2020-10878

2020-06-0100:00:00
ubuntu.com
ubuntu.com
12

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.8%

Perl before 5.30.3 has an integer overflow related to mishandling of a
“PL_regkind[OP(n)] == NOTHING” situation. A crafted regular expression
could lead to malformed bytecode with a possibility of instruction
injection.
An application written in Perl would only be vulnerable to this flaw if
it evaluates regular expressions supplied by the attacker. Evaluating
regular expressions in this fashion is known to be dangerous since the
regular expression engine does not protect against denial of service
attacks in this usage scenario.]

Bugs

Notes

Author Note
alexmurray Affects 5.005 to 5.30.2
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchperl< 5.26.1-6ubuntu0.5UNKNOWN
ubuntu20.04noarchperl< 5.30.0-9ubuntu0.2UNKNOWN
ubuntu14.04noarchperl< 5.18.2-2ubuntu1.7+esm3) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchperl< 5.22.1-9ubuntu0.9UNKNOWN

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

68.8%