3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:P/A:P
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
0.0004 Low
EPSS
Percentile
5.1%
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker
who is able to supply a string longer than 300 characters could cause an
out-of-bounds write, affecting the availability of the service or integrity
of data.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libdbi-perl | < 1.640-1ubuntu0.3 | UNKNOWN |
ubuntu | 14.04 | noarch | libdbi-perl | < any | UNKNOWN |
ubuntu | 16.04 | noarch | libdbi-perl | < 1.634-1ubuntu0.2+esm1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2020-14393
metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.643
nvd.nist.gov/vuln/detail/CVE-2020-14393
security-tracker.debian.org/tracker/CVE-2020-14393
ubuntu.com/security/notices/USN-5030-1
ubuntu.com/security/notices/USN-5030-2
www.cve.org/CVERecord?id=CVE-2020-14393
3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:P/A:P
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
0.0004 Low
EPSS
Percentile
5.1%