Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
References
Link | Resource |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html | Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=108118694327979&w=2 | |
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 | |
http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities | |
http://www.kb.cert.org/vuls/id/722414 | Patch Third Party Advisory US Government Resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15732 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2004-04-06T04:00:00
Updated: 2017-07-10T14:57:01
Reserved: 2004-03-31T00:00:00
Link: CVE-2004-0377
JSON object: View
NVD Information
Status : Modified
Published: 2004-05-04T04:00:00.000
Modified: 2017-07-11T01:30:06.947
Link: CVE-2004-0377
JSON object: View
Redhat Information
No data.
CWE