Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2011-0761NULL Pointer Dereference in Perl

Severity
5.0MEDIUMNVD
EPSS
3.4%
top 12.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 13
Latest updateMay 14

Description

Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/perl< perl 5.12.0-1 (bookworm)
Debianperl/perl< 5.12.0-1+3
NVDperl/perl5.10.0, 5.10.1+1

🔴Vulnerability Details

2
GHSA
GHSA-mmv5-472c-pf4c: Perl 52022-05-14
OSV
CVE-2011-0761: Perl 52011-05-13

💥Exploits & PoCs

1
Exploit-DB
Perl 5.10 - Multiple Null Pointer Dereference Denial of Service Vulnerabilities2011-05-03

📋Vendor Advisories

2
Red Hat
perl: NULL pointer dereference via crafted SOCKET, DIRHANDLE or FILEHANDLE value2011-05-03
Debian
CVE-2011-0761: perl - Perl 5.10.x allows context-dependent attackers to cause a denial of service (NUL...2011

💬Community

2
Bugzilla
CVE-2011-0761 perl: NULL pointer dereference via crafted SOCKET, DIRHANDLE or FILEHANDLE value2011-05-16
Bugzilla
CVE-2011-0761 perl: NULL pointer dereference via crafted SOCKET, DIRHANDLE or FILEHANDLE value [fedora-13]2011-05-16
CVE-2011-0761 — NULL Pointer Dereference in Debian Perl | cvebase