Perl win32_stat Function Buffer Overflow Vulnerability
来源:百度文库 编辑:神马文学网 时间:2024/04/25 23:06:44
Secunia Advisory: SA11298
Release Date: 2004-04-06
Critical:Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Software:ActivePerl 5.x
Perl 5.x
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
CVE reference:CVE-2004-0377
Description:
iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which potentially can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "win32_stat()" function. This can be exploited to cause a buffer overflow by passing an overly long filename with a backslash appended at the end to the function.
Successful exploitation may allow execution of arbitrary code on a system where it is possible for a person to supply a specially crafted pathname to a Perl script (e.g. on a web server).
The vulnerability has been reported in Perl 5.8.3 and prior for Windows.
Solution:
The vulnerability will reportedly be fixed in Perl 5.8.4.
Patches are available for ActivePerl.
Perl 5.9.x development branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22466
Perl 5.8.x maintenance branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552
Provided and/or discovered by:
Greg MacManus, iDEFENSE Labs.
Original Advisory:
http://www.idefense.com/applicat...y?id=93&type=vulnerabilities
Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
Send Feedback to Secunia:
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either ourweb form or email us at vuln@secunia.com.
Ideas, suggestions, and other feedback is most welcome.
Found: 6 Related Secunia Security Advisories
-ActivePerl sitecustomize.pl Privilege Escalation
-Perl Explicit Format Parameter Index Integer Overflow Vulnerability
-Perl "File::Path::rmtree" Directory Permissions Race Condition
-Perl "PERLIO_DEBUG" Privilege Escalation Vulnerabilities
-Perl "File::Path::rmtree" Race Condition
-Perl Multiple Scripts Insecure Temporary File Creation Vulnerabilities
Release Date: 2004-04-06
Critical:Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Software:ActivePerl 5.x
Perl 5.x
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
CVE reference:CVE-2004-0377
Description:
iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which potentially can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "win32_stat()" function. This can be exploited to cause a buffer overflow by passing an overly long filename with a backslash appended at the end to the function.
Successful exploitation may allow execution of arbitrary code on a system where it is possible for a person to supply a specially crafted pathname to a Perl script (e.g. on a web server).
The vulnerability has been reported in Perl 5.8.3 and prior for Windows.
Solution:
The vulnerability will reportedly be fixed in Perl 5.8.4.
Patches are available for ActivePerl.
Perl 5.9.x development branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22466
Perl 5.8.x maintenance branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552
Provided and/or discovered by:
Greg MacManus, iDEFENSE Labs.
Original Advisory:
http://www.idefense.com/applicat...y?id=93&type=vulnerabilities
Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
Send Feedback to Secunia:
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either ourweb form or email us at vuln@secunia.com.
Ideas, suggestions, and other feedback is most welcome.
Found: 6 Related Secunia Security Advisories
-ActivePerl sitecustomize.pl Privilege Escalation
-Perl Explicit Format Parameter Index Integer Overflow Vulnerability
-Perl "File::Path::rmtree" Directory Permissions Race Condition
-Perl "PERLIO_DEBUG" Privilege Escalation Vulnerabilities
-Perl "File::Path::rmtree" Race Condition
-Perl Multiple Scripts Insecure Temporary File Creation Vulnerabilities
Perl win32_stat Function Buffer Overflow Vulnerability
perl-win32stat-bo(15732): Perl and ActivePerl win32_stat buffer overflow
ActivePerl perlIIS.dll Buffer Overflow Vulnerability
Writing Buffer Overflow Exploits with Perl
Buffer Overflow: The Complete Documentation
perl
perl
asp:buffer
Top 10 Vulnerability Scanners
Top 10 Vulnerability Scanners
ShowHTMLDialog Function ()
c function
jufa function
overflow的处理详解
The buffer cache
Response.Buffer详细介绍
Perl 工具
Perl概述
Perl 教程
Perl 教程
the standard function library
The Standard Function Library
sub/function:VBScript 过程
Social Choice Function