Orange Applications for Business
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerability

vulnerability note CVE-2012-5195

Perl: memory corruption via the x operator

Synthesis of the vulnerability

When an attacker can modify parameters of the "x" operator of a Perl program, he can obtain a memory fragment, stop the application, or possibly execute code.
Impacted products: Debian, BIG-IP Appliance, MBS, MES, Mandriva Linux, Solaris, Perl Core, RHEL.
Severity: 2/4.
Creation date: 26/10/2012.
Identifiers: BID-56287, CERTA-2013-AVI-387, CERTA-2013-AVI-543, CERTA-2013-AVI-590, CERTA-2013-AVI-593, CERTFR-2014-AVI-112, CERTFR-2014-AVI-244, CVE-2012-5195, DSA-2586-1, MDVSA-2013:005, MDVSA-2013:113, NDSA20121025, RHSA-2013:0685-01, SOL15867, VIGILANCE-VUL-12094.

Description of the vulnerability

The "x" operator of Perl multiplies a text string (by successive duplications). For example:
  "Hello"x3
produces the string:
  HelloHelloHello

The Perl_pp_repeat() function of the pp.c file implements the "x" operator. However, if the requested multiplier is superior to 2G (with a one byte string), the memset() function can copy too many data. Depending on the context, this error corrupts the memory, or returns an uninitialized memory block to the user.

When an attacker can modify parameters of the "x" operator of a Perl program, he can therefore obtain a memory fragment, stop the application, or possibly execute code.
Complete Vigil@nce bulletin.... (free access)

Share this bulletin

Delicious Digg Facebook Google bookmarks LinkedIn Mail Reddit StumbleUpon Technorati Twitter 

Computer vulnerabilities tracking service

Vigil@nce provides computers vulnerabilities alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system.



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Applications for Business. Site map. Legal notice. Version française