CVE-2017-12837
Published: 19 September 2017
Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier.
Notes
Author | Note |
---|---|
leosilva | portion of affected code is quite different in precise, needs triage could not reproduce in precise. |
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
perl Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(5.26.0-8ubuntu1)
|
precise |
Not vulnerable
(code not present)
|
|
trusty |
Released
(5.18.2-2ubuntu1.3)
|
|
upstream |
Released
(5.26.0-8)
|
|
xenial |
Released
(5.22.1-9ubuntu0.2)
|
|
zesty |
Released
(5.24.1-2ubuntu1.1)
|
|
Patches: upstream: https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837
- https://rt.perl.org/Public/Bug/Display.html?id=131582 (not yet public)
- https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5
- https://ubuntu.com/security/notices/USN-3478-1
- NVD
- Launchpad
- Debian