{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "description", "text": "Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.", "title": "Vulnerability Description" } ], "publisher": { "category": "other", "contact_details": "gdt@cpan.org", "name": "giterlizzi", "namespace": "https://github.com/giterlizzi/" }, "references": [ { "category": "self", "summary": "CPANSA-perl-2008-1927 JSON", "url": "https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2008/cpansa-perl-2008-1927.json" }, { "category": "external", "summary": "http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156", "url": "http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156" }, { "category": "external", "summary": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792" }, { "category": "external", "summary": "http://www.debian.org/security/2008/dsa-1556", "url": "http://www.debian.org/security/2008/dsa-1556" }, { "category": "external", "summary": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html" }, { "category": "external", "summary": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html" }, { "category": "external", "summary": "http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml", "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml" }, { "category": "external", "summary": "http://www.securityfocus.com/bid/28928", "url": "http://www.securityfocus.com/bid/28928" }, { "category": "external", "summary": "http://secunia.com/advisories/29948", "url": "http://secunia.com/advisories/29948" }, { "category": "external", "summary": "http://secunia.com/advisories/30025", "url": "http://secunia.com/advisories/30025" }, { "category": "external", "summary": "http://secunia.com/advisories/30326", "url": "http://secunia.com/advisories/30326" }, { "category": "external", "summary": "http://www.securitytracker.com/id?1020253", "url": "http://www.securitytracker.com/id?1020253" }, { "category": "external", "summary": "http://www.redhat.com/support/errata/RHSA-2008-0522.html", "url": "http://www.redhat.com/support/errata/RHSA-2008-0522.html" }, { "category": "external", "summary": "http://secunia.com/advisories/30624", "url": "http://secunia.com/advisories/30624" }, { "category": "external", "summary": "http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm" }, { "category": "external", "summary": "http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm" }, { "category": "external", "summary": "http://www.ipcop.org/index.php?name=News&file=article&sid=41", "url": "http://www.ipcop.org/index.php?name=News&file=article&sid=41" }, { "category": "external", "summary": "http://secunia.com/advisories/31467", "url": "http://secunia.com/advisories/31467" }, { "category": "external", "summary": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "category": "external", "summary": "http://secunia.com/advisories/31604", "url": "http://secunia.com/advisories/31604" }, { "category": "external", "summary": "http://secunia.com/advisories/31208", "url": "http://secunia.com/advisories/31208" }, { "category": "external", "summary": "http://secunia.com/advisories/31328", "url": "http://secunia.com/advisories/31328" }, { "category": "external", "summary": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "category": "external", "summary": "http://www.redhat.com/support/errata/RHSA-2008-0532.html", "url": "http://www.redhat.com/support/errata/RHSA-2008-0532.html" }, { "category": "external", "summary": "http://secunia.com/advisories/31687", "url": "http://secunia.com/advisories/31687" }, { "category": "external", "summary": "http://osvdb.org/44588", "url": "http://osvdb.org/44588" }, { "category": "external", "summary": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:100", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:100" }, { "category": "external", "summary": "http://www.ubuntu.com/usn/usn-700-1", "url": "http://www.ubuntu.com/usn/usn-700-1" }, { "category": "external", "summary": "http://secunia.com/advisories/33314", "url": "http://secunia.com/advisories/33314" }, { "category": "external", "summary": "http://wiki.rpath.com/Advisories:rPSA-2009-0011", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0011" }, { "category": "external", "summary": "http://www.ubuntu.com/usn/usn-700-2", "url": "http://www.ubuntu.com/usn/usn-700-2" }, { "category": "external", "summary": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "category": "external", "summary": "http://secunia.com/advisories/33937", "url": "http://secunia.com/advisories/33937" }, { "category": "external", "summary": "http://support.apple.com/kb/HT3438", "url": "http://support.apple.com/kb/HT3438" }, { "category": "external", "summary": "http://www.vupen.com/english/advisories/2009/0422", "url": "http://www.vupen.com/english/advisories/2009/0422" }, { "category": "external", "summary": "http://www.vupen.com/english/advisories/2008/2361", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "category": "external", "summary": "http://www.vupen.com/english/advisories/2008/2424", "url": "http://www.vupen.com/english/advisories/2008/2424" }, { "category": "external", "summary": "http://www.vupen.com/english/advisories/2008/2265/references", "url": "http://www.vupen.com/english/advisories/2008/2265/references" }, { "category": "external", "summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41996", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41996" }, { "category": "external", "summary": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579" }, { "category": "external", "summary": "http://www.securityfocus.com/archive/1/500210/100/0/threaded", "url": "http://www.securityfocus.com/archive/1/500210/100/0/threaded" }, { "category": "external", "summary": "CVE-2008-1927 (NVD)", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927" } ], "title": "perl vulnerability", "tracking": { "current_release_date": "2008-04-24T00:00:00", "generator": { "engine": { "name": "CSAF Perl Toolkit", "version": "0.26" } }, "id": "CPANSA-perl-2008-1927", "initial_release_date": "2008-04-24T00:00:00", "revision_history": [ { "date": "2008-04-24T00:00:00", "number": "1", "summary": "First release" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:cpan/<=5.8.8", "product": { "name": "perl less than or equal 5.8.8", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "perl" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-1927", "cwe": { "id": "CWE-399", "name": "Resource Management Errors" }, "notes": [ { "category": "description", "text": "Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.", "title": "Vulnerability Description" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "scores": [ { "cvss_v2": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }