Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2020-06-05 07:15
Updated : 2022-05-12 08:00
NVD link : CVE-2020-10878
Mitre link : CVE-2020-10878
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
oracle
- communications_lsms
- communications_pricing_design_center
- tekelec_platform_distribution
- communications_offline_mediation_controller
- communications_performance_intelligence_center
- communications_eagle_lnp_application_processor
- enterprise_manager_base_platform
- communications_billing_and_revenue_management
- communications_eagle_application_processor
- configuration_manager
- sd-wan_aware
- communications_diameter_signaling_router
perl
- perl
fedoraproject
- fedora
netapp
- snap_creator_framework
- oncommand_workflow_automation
opensuse
- leap