#VU32067 Heap-based buffer overflow in Perl - CVE-2017-12837
Published: September 19, 2017 / Updated: December 21, 2022
Perl
Perl
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1. A remote attacker can use a regular expression with a to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://www.debian.org/security/2017/dsa-3982
- http://www.securityfocus.com/bid/100860
- https://bugzilla.redhat.com/show_bug.cgi?id=1492091
- https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5
- https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
- https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
- https://rt.perl.org/Public/Bug/Display.html?id=131582
- https://security.netapp.com/advisory/ntap-20180426-0001/
- https://www.oracle.com/security-alerts/cpujul2020.html