CVE-2010-4777
Published Feb 10, 2014
Last updated 11 years ago
Overview
- Description
- The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "777EC860-FB16-4B15-A8BE-3EAE9FD8A99D" }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BC3F8EA-BE60-4EAB-A9B9-DB1368B5430C" }, { "criteria": "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A968B30-8456-49C2-A9B0-6CF55CB3C7B4" } ], "operator": "OR" } ] } ]