Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/722414 | Patch Third Party Advisory US Government Resource |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html | Patch Vendor Advisory |
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 | |
http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities | |
http://marc.info/?l=bugtraq&m=108118694327979&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15732 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-05-03 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-0377
Mitre link : CVE-2004-0377
JSON object : View
CWE
Products Affected
activestate
- activeperl
larry_wall
- perl