Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-12723 |
CWE-ID | CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
WordPress Gallery Plugin - NextGEN Gallery Web applications / Modules and components for CMS perl (Alpine package) Operating systems & Components / Operating system package or component |
Vendor |
Imagely Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU29016
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-12723
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) áttack.
The vulnerability exists due to a boundary error within the recursive "S_study_chunk" calls. A remote attacker can use a specially crafted regular expression , trigger memory corruption and cause a denial of service condition on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsWordPress Gallery Plugin - NextGEN Gallery: 2.1.0
perl (Alpine package): 0.8.9 - 1.2.1
perl (Alpine package): 1.1.47
perl (Alpine package): 20101020ubuntu213 - 20101020ubuntu451.6
perl (Alpine package): 0.2.69 - 1.4.41
perl (Alpine package): 0.0.1daily13.06.18-0ubuntu1 - 5.0.0-0ubuntu2
perl (Alpine package): 0.4.17 - 0.5.8-1
perl (Alpine package): 0.2.12-1
perl (Alpine package): 7.11.0-3 - 7.26.0-1ubuntu1
perl (Alpine package): 1.0.59-1
perl (Alpine package): 0.7.1-0ubuntu4 - 0.7.1-0ubuntu5
perl (Alpine package): 2.01-1
perl (Alpine package): 4.1-2851
perl (Alpine package): 2.5.1
perl (Alpine package): 1.4.12.1
perl (Alpine package): 2.1.4
perl (Alpine package): 0.7.7
perl (Alpine package): 7.6.6
perl (Alpine package):
perl (Alpine package): before 5.26.3-r1
CPE2.3https://git.alpinelinux.org/aports/commit/?id=2347c5642490c5f7dc79c2205fff672b7bf5a3f6
https://git.alpinelinux.org/aports/commit/?id=2db22e01ffdcff6cb673b0f5660cb911cff79bc1
https://git.alpinelinux.org/aports/commit/?id=d5907c68b2341579983e3fc9a25ac4b67162c994
https://git.alpinelinux.org/aports/commit/?id=f4e478f351ceedb178ec76b3b5ba2b2defdf99c8
https://git.alpinelinux.org/aports/commit/?id=0bae63fd8d47db4b5bf4e1407c139f804fa62f4f
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.