CVE-2017-12883Improper Restriction of Operations within the Bounds of a Memory Buffer in Perl

Severity
9.1CRITICALNVD
OSV7.5
EPSS
4.7%
top 10.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 19
Latest updateMay 13

Description

Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages4 packages

debiandebian/perl< perl 5.26.0-8 (bookworm)
Debianperl/perl< 5.26.0-8+3
Ubuntuperl/perl< 5.18.2-2ubuntu1.3+1
NVDperl/perl5.24.2+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-h435-qr7v-xh34: Buffer overflow in the S_grok_bslash_N function in regcomp2022-05-13
OSV
perl vulnerabilities2017-11-13
OSV
CVE-2017-12883: Buffer overflow in the S_grok_bslash_N function in regcomp2017-09-19

📋Vendor Advisories

4
Ubuntu
Perl vulnerability2017-11-13
Ubuntu
Perl vulnerabilities2017-11-13
Red Hat
perl: Buffer over-read in regular expression parser2017-09-12
Debian
CVE-2017-12883: perl - Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5....2017

💬Community

2
Bugzilla
CVE-2017-12883 perl: Buffer over-read in regular expression parser2017-09-15
Bugzilla
CVE-2017-12837 CVE-2017-12883 perl: various flaws [fedora-all]2017-09-15