Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:03
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch - | |
| References | () ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch - | |
| References | () ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U - | |
| References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056 - | |
| References | () http://docs.info.apple.com/article.html?artnum=304829 - | |
| References | () http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html - | |
| References | () http://marc.info/?l=full-disclosure&m=113342788118630&w=2 - | |
| References | () http://secunia.com/advisories/17762 - Vendor Advisory | |
| References | () http://secunia.com/advisories/17802 - Vendor Advisory | |
| References | () http://secunia.com/advisories/17844 - Vendor Advisory | |
| References | () http://secunia.com/advisories/17941 - Vendor Advisory | |
| References | () http://secunia.com/advisories/17952 - Vendor Advisory | |
| References | () http://secunia.com/advisories/17993 - Vendor Advisory | |
| References | () http://secunia.com/advisories/18075 - Vendor Advisory | |
| References | () http://secunia.com/advisories/18183 - Vendor Advisory | |
| References | () http://secunia.com/advisories/18187 - Vendor Advisory | |
| References | () http://secunia.com/advisories/18295 - Vendor Advisory | |
| References | () http://secunia.com/advisories/18413 - Vendor Advisory | |
| References | () http://secunia.com/advisories/18517 - Vendor Advisory | |
| References | () http://secunia.com/advisories/19041 - Vendor Advisory | |
| References | () http://secunia.com/advisories/20894 - Vendor Advisory | |
| References | () http://secunia.com/advisories/23155 - Vendor Advisory | |
| References | () http://secunia.com/advisories/31208 - Vendor Advisory | |
| References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1 - | |
| References | () http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm - | |
| References | () http://www.debian.org/security/2006/dsa-943 - | |
| References | () http://www.dyadsecurity.com/perl-0002.html - Patch, Vendor Advisory | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml - | |
| References | () http://www.ipcop.org/index.php?name=News&file=article&sid=41 - | |
| References | () http://www.kb.cert.org/vuls/id/948385 - US Government Resource | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:225 - | |
| References | () http://www.novell.com/linux/security/advisories/2005_29_sr.html - | |
| References | () http://www.novell.com/linux/security/advisories/2005_71_perl.html - | |
| References | () http://www.openbsd.org/errata37.html#perl - | |
| References | () http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html - | |
| References | () http://www.osvdb.org/21345 - | |
| References | () http://www.osvdb.org/22255 - | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-880.html - Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-881.html - Vendor Advisory | |
| References | () http://www.securityfocus.com/archive/1/418333/100/0/threaded - | |
| References | () http://www.securityfocus.com/archive/1/438726/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/15629 - | |
| References | () http://www.trustix.org/errata/2005/0070 - | |
| References | () http://www.us-cert.gov/cas/techalerts/TA06-333A.html - US Government Resource | |
| References | () http://www.vupen.com/english/advisories/2005/2688 - | |
| References | () http://www.vupen.com/english/advisories/2006/0771 - | |
| References | () http://www.vupen.com/english/advisories/2006/2613 - Vendor Advisory | |
| References | () http://www.vupen.com/english/advisories/2006/4750 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074 - | |
| References | () https://usn.ubuntu.com/222-1/ - | |
| References | () https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html - | 
Information
                Published : 2005-12-01 17:03
Updated : 2025-04-03 01:03
NVD link : CVE-2005-3962
Mitre link : CVE-2005-3962
CVE.ORG link : CVE-2005-3962
JSON object : View
Products Affected
                perl
- perl
CWE
                
                    
                        
                        CWE-189
                        
            Numeric Errors
