Buffer overflow in Perl - CVE-2017-12883

 

Buffer overflow in Perl - CVE-2017-12883

Published: September 19, 2017 / Updated: July 28, 2020


Vulnerability identifier: #VU32068
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2017-12883
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Perl
Affected software:
Perl

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid 'N{U+...}' escape.


How to mitigate CVE-2017-12883

Install update from vendor's website.

Sources