Out-of-Bounds Affecting perl package, versions <5.20.1-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-PERL-327665
- published 30 Sep 2014
- disclosed 30 Sep 2014
Introduced: 30 Sep 2014
CVE-2014-4330 Open this link in a new tabHow to fix?
Upgrade Debian:9
perl
to version 5.20.1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perl
package and not the perl
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
References
- https://security-tracker.debian.org/tracker/CVE-2014-4330
- http://www.securityfocus.com/archive/1/533543/100/0/threaded
- http://advisories.mageia.org/MGASA-2014-0406.html
- https://metacpan.org/pod/distribution/Data-Dumper/Changes
- https://www.lsexperts.de/advisories/lse-2014-06-10.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
- http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
- http://seclists.org/oss-sec/2014/q3/692
- http://seclists.org/fulldisclosure/2014/Sep/84
- http://secunia.com/advisories/61441
- http://secunia.com/advisories/61961
- http://www.securityfocus.com/bid/70142
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-4330
- http://www.ubuntu.com/usn/USN-2916-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:136