Perl win32_stat Function Buffer Overflow Vulnerability

来源:百度文库 编辑:神马文学网 时间:2024/04/25 23:06:44
Secunia Advisory: SA11298
Release Date: 2004-04-06
Critical:Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch
Software:ActivePerl 5.x
Perl 5.x
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
CVE reference:CVE-2004-0377
Description:
iDEFENSE has discovered a vulnerability in Perl and ActivePerl, which potentially can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "win32_stat()" function. This can be exploited to cause a buffer overflow by passing an overly long filename with a backslash appended at the end to the function.
Successful exploitation may allow execution of arbitrary code on a system where it is possible for a person to supply a specially crafted pathname to a Perl script (e.g. on a web server).
The vulnerability has been reported in Perl 5.8.3 and prior for Windows.
Solution:
The vulnerability will reportedly be fixed in Perl 5.8.4.
Patches are available for ActivePerl.
Perl 5.9.x development branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22466
Perl 5.8.x maintenance branch:
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552
Provided and/or discovered by:
Greg MacManus, iDEFENSE Labs.
Original Advisory:
http://www.idefense.com/applicat...y?id=93&type=vulnerabilities
Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
Send Feedback to Secunia:
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either ourweb form or email us at vuln@secunia.com.
Ideas, suggestions, and other feedback is most welcome.
Found: 6 Related Secunia Security Advisories
-ActivePerl sitecustomize.pl Privilege Escalation
-Perl Explicit Format Parameter Index Integer Overflow Vulnerability
-Perl "File::Path::rmtree" Directory Permissions Race Condition
-Perl "PERLIO_DEBUG" Privilege Escalation Vulnerabilities
-Perl "File::Path::rmtree" Race Condition
-Perl Multiple Scripts Insecure Temporary File Creation Vulnerabilities