Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/15732 | vdb entry |
http://marc.info/?l=bugtraq&m=108118694327979&w=2 | mailing list |
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 | |
http://www.kb.cert.org/vuls/id/722414 | patch third party advisory us government resource |
http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities | |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html | patch vendor advisory mailing list |