Vulnerabilities > CVE-2009-3626 - Unspecified vulnerability in Perl 5.10.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.
Seebug
bulletinFamily | exploit |
description | Bugraq ID: 36812 CVE ID: CVE-2009-3626 Perl是一款流行的网络编程语言。 Perl在处理包含在规则表达式中使用UTF-8字符的字符串时存在错误,远程攻击者可以利用漏洞使解释器崩溃。 提交包含大量非法的UTF-8字符的邮件消息,给使用Perl的应用程序解析,可导致解析器崩溃。 Larry Wall Perl 5.10.1 + Turbolinux Home + Turbolinux Turbolinux Desktop 10.0 厂商解决方案 GIT库已经修正此漏洞,建议用户下载使用: http://perl5.git.perl.org/perl.git/commitdiff/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4 |
id | SSV:12531 |
last seen | 2017-11-19 |
modified | 2009-10-28 |
published | 2009-10-28 |
reporter | Root |
title | Perl UTF-8规则表达式处理远程拒绝服务漏洞 |
Statements
contributor | Tomas Hoger |
lastmodified | 2009-10-30 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect the versions of perl as shipped with Red Hat Enterprise Linux 3, 4, or 5. |
References
- http://perl5.git.perl.org/perl.git/commit/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4
- http://perl5.git.perl.org/perl.git/commit/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4
- http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973
- http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973
- http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/
- http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/
- http://secunia.com/advisories/37144
- http://secunia.com/advisories/37144
- http://securitytracker.com/id?1023077
- http://securitytracker.com/id?1023077
- http://www.openwall.com/lists/oss-security/2009/10/23/8
- http://www.openwall.com/lists/oss-security/2009/10/23/8
- http://www.osvdb.org/59283
- http://www.osvdb.org/59283
- http://www.securityfocus.com/bid/36812
- http://www.securityfocus.com/bid/36812
- http://www.vupen.com/english/advisories/2009/3023
- http://www.vupen.com/english/advisories/2009/3023
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53939
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53939
- https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225
- https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225