Vulnerability Details : CVE-2005-3962
Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-3962
Probability of exploitation activity in the next 30 days: 0.15%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 51 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-3962
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
CWE ids for CVE-2005-3962
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-3962
-
http://www.redhat.com/support/errata/RHSA-2005-880.html
Vendor Advisory
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://www.trustix.org/errata/2005/0070
- http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
-
http://www.redhat.com/support/errata/RHSA-2005-881.html
Vendor Advisory
- http://www.ipcop.org/index.php?name=News&file=article&sid=41
-
http://www.openbsd.org/errata37.html#perl
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
- http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
-
http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml
-
http://www.securityfocus.com/archive/1/438726/100/0/threaded
-
https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html
-
http://www.securityfocus.com/archive/1/418333/100/0/threaded
- http://docs.info.apple.com/article.html?artnum=304829
-
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch
-
http://www.mandriva.com/security/advisories?name=MDKSA-2005:225
-
http://www.kb.cert.org/vuls/id/948385
US Government Resource
-
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch
-
https://usn.ubuntu.com/222-1/
-
http://marc.info/?l=full-disclosure&m=113342788118630&w=2
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598
-
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074
- http://www.vupen.com/english/advisories/2006/4750
-
http://www.novell.com/linux/security/advisories/2005_71_perl.html
-
http://www.securityfocus.com/bid/15629
- http://www.novell.com/linux/security/advisories/2005_29_sr.html
-
http://www.dyadsecurity.com/perl-0002.html
Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2005/2688
-
http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html
-
http://www.debian.org/security/2006/dsa-943
-
http://www.vupen.com/english/advisories/2006/0771
-
http://www.vupen.com/english/advisories/2006/2613
Vendor Advisory
Products affected by CVE-2005-3962
- cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*