CVE-2004-0377

Current Description

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

Basic Data

PublishedMay 04, 2004
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationActivestateActiveperl********
    2.3ApplicationLarry WallPerl********5.8.3

Vulnerable Software List

VendorProductVersions
Larry Wall Perl *
Activestate Activeperl *

References

NameSourceURLTags
20040405 iDEFENSE Security Advisory 04.05.04: Perl win32_stat Functionhttp://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.htmlFULLDISCPATCH Vendor Advisory
20040405 [Full-Disclosure] iDEFENSE Security Advisory 04.05.04: Perl win32_stat Functionhttp://marc.info/?l=bugtraq&m=108118694327979&w=2BUGTRAQ
http://public.activestate.com/cgi-bin/perlbrowse?patch=22552http://public.activestate.com/cgi-bin/perlbrowse?patch=22552CONFIRM
http://www.idefense.com/application/poi/display?id=93&type=vulnerabilitieshttp://www.idefense.com/application/poi/display?id=93&type=vulnerabilitiesMISC
VU#722414http://www.kb.cert.org/vuls/id/722414CERT-VNPATCH Third Party Advisory US Government Resource
perl-win32stat-bo(15732)https://exchange.xforce.ibmcloud.com/vulnerabilities/15732XF