ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/16169 | vdb entry |
http://www.perlmonks.org/index.pl?node_id=354145 | exploit |
http://marc.info/?l=full-disclosure&m=108489112131099&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=108489894009025&w=2 | mailing list |
http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt | exploit |
http://marc.info/?l=full-disclosure&m=108483058514596&w=2 | mailing list |
http://marc.info/?l=full-disclosure&m=108482796105922&w=2 | mailing list |
http://www.securityfocus.com/bid/10375 | vdb entry exploit |
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html | mailing list |