All the vulnerabilites related to dan_kogai - encode_module
cve-2011-2939
Vulnerability from cvelistv5
Published
2012-01-13 18:00
Modified
2024-08-06 23:15
Severity ?
EPSS score ?
Summary
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46989" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod" }, { "name": "55314", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55314" }, { "name": "USN-1643-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1643-1" }, { "name": "49858", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/49858" }, { "name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5" }, { "name": "46172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46172" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29" }, { "name": "MDVSA-2012:008", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008" }, { "name": "RHSA-2011:1424", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html" }, { "name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17" }, { "name": "51457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51457" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-02-17T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "46989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46989" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod" }, { "name": "55314", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55314" }, { "name": "USN-1643-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1643-1" }, { "name": "49858", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/49858" }, { "name": "[oss-security] 20110818 CVE request: heap overflow in perl while decoding Unicode string", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5" }, { "name": "46172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46172" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29" }, { "name": "MDVSA-2012:008", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008" }, { "name": "RHSA-2011:1424", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html" }, { "name": "[oss-security] 20110819 Re: CVE request: heap overflow in perl while decoding Unicode string", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17" }, { "name": "51457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51457" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2939", "datePublished": "2012-01-13T18:00:00", "dateReserved": "2011-07-27T00:00:00", "dateUpdated": "2024-08-06T23:15:31.951Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-01-13 18:55
Modified
2024-11-21 01:29
Severity ?
Summary
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dan_kogai:encode_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "23343380-F5F0-4DB9-B36D-9BD9A856DCDD", "versionEndIncluding": "2.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.93:*:*:*:*:*:*:*", "matchCriteriaId": "DB0FAA45-165C-49B6-8FA3-45014E968CEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.94:*:*:*:*:*:*:*", "matchCriteriaId": "8EEAA1BA-E531-4119-8723-D46420636D79", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "B14AD913-D028-4D04-A55E-4FD7DB11F76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "3B36219E-A5FC-41ED-80AC-007E43E95B30", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.97:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3B13C-7333-4FFE-9C20-645560B76F26", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.98:*:*:*:*:*:*:*", "matchCriteriaId": "B3D4DA4E-8B1B-49C6-A2C0-1FC800633282", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:0.99:*:*:*:*:*:*:*", "matchCriteriaId": "6337FDFD-262E-40D0-80D4-B8D3C9070718", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "D27B48BF-A9AE-4AA5-897D-5D0F4705F361", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5E90A39E-23A7-4387-B17C-3EFAC440B9FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0F228758-CA6D-4228-ACCF-D2483535E9E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9761D4BA-4307-4EF7-9BB9-F5576806FDDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "6DC64031-55DA-4B54-ABCD-EBD80A1A0040", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FB2EDB2F-775B-4CBD-9F14-7DC9E6FE1289", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.25:*:*:*:*:*:*:*", "matchCriteriaId": "7015226C-63CC-4F17-ADA4-7F7DD6DF47EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "EF91D347-7305-4FBA-8334-A34BF6E1EBFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.28:*:*:*:*:*:*:*", "matchCriteriaId": "97EE437D-ADCD-4AD4-846A-0C5B8D2664F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.30:*:*:*:*:*:*:*", "matchCriteriaId": "905DAED7-33EE-4EEF-99A3-81BA9F3E3124", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.31:*:*:*:*:*:*:*", "matchCriteriaId": "BC222DEE-AE58-411B-8EAC-57234FF70BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.32:*:*:*:*:*:*:*", "matchCriteriaId": "49931341-5E98-4295-A6A7-0BC1B6F9ADE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.33:*:*:*:*:*:*:*", "matchCriteriaId": "F3095E4F-6BA2-4F87-BABC-4D6340294575", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.34:*:*:*:*:*:*:*", "matchCriteriaId": "FCFDA3D7-0E68-4319-8DBA-467C32C4128E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.40:*:*:*:*:*:*:*", "matchCriteriaId": "E52CBCA7-F8CC-461A-936F-AB2498D88FE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "1EE81428-9030-417D-A557-A2B6F7061372", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.42:*:*:*:*:*:*:*", "matchCriteriaId": "7E60DB35-48DD-4660-8BB5-A307193688DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.50:*:*:*:*:*:*:*", "matchCriteriaId": "B5D2BEEC-F6A0-411E-A524-7BF0A6CF26E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.51:*:*:*:*:*:*:*", "matchCriteriaId": "EBC200E4-4EA8-4891-9540-3D6D7B62D497", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.52:*:*:*:*:*:*:*", "matchCriteriaId": "9E90392A-ED00-48C4-B091-A5A5438A2D2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.53:*:*:*:*:*:*:*", "matchCriteriaId": "BBF8384C-283F-4B18-9E39-579397F3E418", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "0185F681-2BA2-4DCF-B737-5A5065D32D76", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.55:*:*:*:*:*:*:*", "matchCriteriaId": "C0A8712D-8C6A-498A-8F35-79CD0642137F", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.56:*:*:*:*:*:*:*", "matchCriteriaId": "6EA599B4-E7F0-421C-BF64-F74E827D27C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.57:*:*:*:*:*:*:*", "matchCriteriaId": "5BA4200C-0355-429A-82F8-4BC90091D9C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.58:*:*:*:*:*:*:*", "matchCriteriaId": "BB647828-E946-4627-98F5-01218FAE65D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.59:*:*:*:*:*:*:*", "matchCriteriaId": "9B540908-5419-4F32-B252-E62A67403452", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.60:*:*:*:*:*:*:*", "matchCriteriaId": "50836D06-5FC5-4E71-AFA7-2487A5E841F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.61:*:*:*:*:*:*:*", "matchCriteriaId": "DD5F10EC-70A9-4D5D-97D6-66D2A3F2BA5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.62:*:*:*:*:*:*:*", "matchCriteriaId": "E03B165C-421F-4B94-8B02-D2582FF780F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.63:*:*:*:*:*:*:*", "matchCriteriaId": "59F862D3-A61D-4CA1-8FAF-4A6368C515C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.64:*:*:*:*:*:*:*", "matchCriteriaId": "4D88707B-2345-42F2-B906-EED96926E14E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.65:*:*:*:*:*:*:*", "matchCriteriaId": "F5449D0E-E7AB-4DE0-A657-2285046F84BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.66:*:*:*:*:*:*:*", "matchCriteriaId": "AEBFF477-F35D-4AE0-BCD3-E50C66502E71", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.67:*:*:*:*:*:*:*", "matchCriteriaId": "31D8A6EB-1A14-456C-BDB3-47EA202980D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.68:*:*:*:*:*:*:*", "matchCriteriaId": "22EB2CE5-88D7-41B2-948C-B7A4D37DEDA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.69:*:*:*:*:*:*:*", "matchCriteriaId": "27E8C6E6-DDD2-483B-8CA9-5FA10E10B08A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.70:*:*:*:*:*:*:*", "matchCriteriaId": "95D6FD71-53C6-4AAF-9F97-D42E80C6F69B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.71:*:*:*:*:*:*:*", "matchCriteriaId": "431FF64D-03C1-4E66-B5C0-DD373778B08D", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.72:*:*:*:*:*:*:*", "matchCriteriaId": "59B57F16-18AF-40F1-BFCB-FC3E7200FD25", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.73:*:*:*:*:*:*:*", "matchCriteriaId": "37CF6920-9E2E-4A4C-A271-47CD1075EB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.74:*:*:*:*:*:*:*", "matchCriteriaId": "47618894-4544-4F22-8005-2C2F58793AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.75:*:*:*:*:*:*:*", "matchCriteriaId": "5C73DA11-31A0-416F-9853-59C82F72D822", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.76:*:*:*:*:*:*:*", "matchCriteriaId": "4C04B436-B71D-467D-95A9-254C59E5FAC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.77:*:*:*:*:*:*:*", "matchCriteriaId": "FDC5667E-D4AA-4645-BCC7-C148F60EEF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.78:*:*:*:*:*:*:*", "matchCriteriaId": "CA110759-1728-4BCD-93CA-052037CF1599", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.79:*:*:*:*:*:*:*", "matchCriteriaId": "25438F7D-A683-47D5-AB8C-16B1FC266383", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.80:*:*:*:*:*:*:*", "matchCriteriaId": "962B545B-A962-4143-A24A-7FC066B390E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.81:*:*:*:*:*:*:*", "matchCriteriaId": "238741B3-A4A5-4A19-9573-74D5DF7FF40B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.82:*:*:*:*:*:*:*", "matchCriteriaId": "7016CC69-8034-413A-BD79-14047B0C3847", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.83:*:*:*:*:*:*:*", "matchCriteriaId": "108CCE2F-50A0-406B-B082-536556EC5D9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.84:*:*:*:*:*:*:*", "matchCriteriaId": "FB3A78B9-B1BC-4EFA-BA05-4D671F4C308A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.85:*:*:*:*:*:*:*", "matchCriteriaId": "7143F1DC-20A2-42E1-9132-B5C3097BC41B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.86:*:*:*:*:*:*:*", "matchCriteriaId": "3F558DE5-F39C-47E0-A369-CC515DCB2678", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.87:*:*:*:*:*:*:*", "matchCriteriaId": "C9D58BC3-9DFA-4EE4-86C0-49068246C04B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.88:*:*:*:*:*:*:*", "matchCriteriaId": "F3515296-AC71-4EC8-A59B-209078314757", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.89:*:*:*:*:*:*:*", "matchCriteriaId": "49927F8D-D387-4742-B0CA-F9101497DAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.90:*:*:*:*:*:*:*", "matchCriteriaId": "C6AF0CAA-C03A-449A-8E75-F12E8721A964", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.91:*:*:*:*:*:*:*", "matchCriteriaId": "5E144DD8-EB87-4D42-AE6E-1CEDE2614332", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.92:*:*:*:*:*:*:*", "matchCriteriaId": "EF5B388A-D7D1-4371-9A08-E792EC918C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.93:*:*:*:*:*:*:*", "matchCriteriaId": "C81AD6D9-80A3-4218-B3FD-8B3ED48F44E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.94:*:*:*:*:*:*:*", "matchCriteriaId": "983E0EE0-DA5C-447D-B6E2-2D165C74C0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.95:*:*:*:*:*:*:*", "matchCriteriaId": "E7F86D10-83C4-488C-9380-D4A7C056879E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.96:*:*:*:*:*:*:*", "matchCriteriaId": "BADA05F7-DA93-40F3-A281-890002D8BA4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.97:*:*:*:*:*:*:*", "matchCriteriaId": "CD150F64-462B-420C-BC88-B8BF30C2B296", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.98:*:*:*:*:*:*:*", "matchCriteriaId": "133C7F0C-E3C2-4733-8004-05714DC643B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:1.99:*:*:*:*:*:*:*", "matchCriteriaId": "963C689B-72F8-4310-BDAD-1860560EB726", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE081501-0933-4C1D-88F2-182134E03EB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "B2405CC1-9009-4E00-88D5-4CC24F5BFBDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "39B2262D-01E7-4748-A567-5BF66EF90526", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "04866020-8327-4F5F-907E-ED404A5B91C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.04:*:*:*:*:*:*:*", "matchCriteriaId": "15F5F4A0-3B46-4E05-AE11-3953E1A83332", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.05:*:*:*:*:*:*:*", "matchCriteriaId": "8B40204C-F16F-4108-A065-C7F1FE5FE598", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.06:*:*:*:*:*:*:*", "matchCriteriaId": "499AFE0E-6B9C-44CE-BDC1-9445A5F46D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.07:*:*:*:*:*:*:*", "matchCriteriaId": "4B23AD9C-F4FB-40EB-829D-4DD8869EB9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.08:*:*:*:*:*:*:*", "matchCriteriaId": "D2956E57-2FC9-4B01-83CD-B793136D4658", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.09:*:*:*:*:*:*:*", "matchCriteriaId": "A6BFB614-13DC-48AD-A9B2-18785AD91FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "AB086C28-A86B-4DA2-A03C-45729469B441", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "93659981-81CD-408C-A4BC-0E7EB9F6F056", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "A5AE4F9D-8302-469A-B564-B050581EEA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.13:*:*:*:*:*:*:*", "matchCriteriaId": "AD1D845C-B499-42FD-A5F1-E39A215A56FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.14:*:*:*:*:*:*:*", "matchCriteriaId": "98567153-1D89-44E1-9C19-B7EC9AB1A31A", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.15:*:*:*:*:*:*:*", "matchCriteriaId": "9F16E666-8B84-4A7B-A71E-92AF341CC9F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.16:*:*:*:*:*:*:*", "matchCriteriaId": "B009EBDA-D9C8-4B8A-99D1-EA51A2BE91C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.17:*:*:*:*:*:*:*", "matchCriteriaId": "88AE4748-F054-4D9C-BCD4-89160237AB10", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.18:*:*:*:*:*:*:*", "matchCriteriaId": "A7030EEC-7426-44E1-900C-A4B381EFF4A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.19:*:*:*:*:*:*:*", "matchCriteriaId": "0AC0EBF0-6804-424A-A131-23965F4874A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.20:*:*:*:*:*:*:*", "matchCriteriaId": "AEDA775A-9AD8-4B1F-B6B6-F7B89AF3945C", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.21:*:*:*:*:*:*:*", "matchCriteriaId": "B1861342-EB74-44CD-BB51-78F2233E0F51", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.22:*:*:*:*:*:*:*", "matchCriteriaId": "22BB1E7B-AFEF-4BD6-9B5A-267326963595", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "F47C0CF2-2D3A-4309-82A5-87E733271B24", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.24:*:*:*:*:*:*:*", "matchCriteriaId": "8B4A90A7-6D67-4373-B220-7B9BFFFBA1FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.25:*:*:*:*:*:*:*", "matchCriteriaId": "E1FCB23B-5B66-421B-8B10-DD05DAA344A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.26:*:*:*:*:*:*:*", "matchCriteriaId": "95B47D61-F2AE-4A68-BF96-5E176D21EF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "E1C8332F-1E58-44D0-B076-AC4340303EF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.28:*:*:*:*:*:*:*", "matchCriteriaId": "B057F456-189A-49F1-952D-0EFBC16D5A79", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.29:*:*:*:*:*:*:*", "matchCriteriaId": "FAC64DAE-208E-4FFD-BD03-43917CE4CC7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "A48E88B4-0663-4C8E-A48B-FDA4087E24E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "81E890C2-2657-4BD6-B3AD-F9023D4AF08F", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "E95C665C-B2E4-4129-A107-E6897969CF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "2244E758-9D3F-4D0F-A2CA-023E62B49F4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "7C199B35-4F8F-4AA6-864E-81B2F0BF4DD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.35:*:*:*:*:*:*:*", "matchCriteriaId": "1C5B8993-43F4-45D2-B7E9-AA6722EF555F", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.36:*:*:*:*:*:*:*", "matchCriteriaId": "B477187B-559C-4011-BF92-3A7F2AF8B301", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.37:*:*:*:*:*:*:*", "matchCriteriaId": "7D8C5D47-DC01-4202-B9FF-32024E329848", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.38:*:*:*:*:*:*:*", "matchCriteriaId": "8AF82AC9-AE7B-4B65-A170-D085267E0EC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.39:*:*:*:*:*:*:*", "matchCriteriaId": "428762B2-E0BE-4804-BF28-F1292AC87FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "5F5682F2-5E0B-4D9E-BF7F-04D8C5EE12F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "C5B2D4B6-BE40-45E3-9AE9-568E1DD3D1C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:dan_kogai:encode_module:2.42:*:*:*:*:*:*:*", "matchCriteriaId": "F148F0BF-49F1-4E5E-B92F-FEB83C1B0157", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE55A238-C38C-4C74-B2D4-D4A5EBBA32B2", "versionEndIncluding": "5.14.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "70CBBC87-F6F7-45AF-9B54-95402D03C75F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B34EA51-64A3-483A-AF99-01358F6BE8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8E0DBA5-360F-463E-A840-365168A1FCC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "5EA80F25-A108-4B65-BE25-56DE17B930EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "ECB2B6E2-890E-4B6E-833F-DF40E6D77E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "53F0358E-0722-48A6-A2C6-470229602089", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "A8DFDF97-EF44-448F-A5CA-021B2D64605F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "E98D2706-99B7-4153-925B-77A8CECD7CFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "B10AD15E-6275-48AB-8757-FB5A735C82D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "7B358BF3-55AC-477E-A4B5-3960C449C011", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "DF69341A-4D00-424E-AD0F-FA7515278770", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "777EC860-FB16-4B15-A8BE-3EAE9FD8A99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B84C088-F29F-4498-A390-187505361962", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "17E86767-47EB-4A39-B8E1-A4B9AB4BC20E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DB77E3D6-9F24-4C51-86E4-CD014DF0F66E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "4D67E248-C0B8-4713-9D9A-47097885A2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "B32436EE-DA64-41AD-B967-26C6D4973FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "CF46E50D-AE29-49FD-884B-488D9EB879D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "77B23E85-8167-4B17-8D76-BD807067BB4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "8355C16E-16D4-4A68-BFD3-125892E3FA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "85FFA753-4B14-4B52-941F-C33D41451EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "B99FD006-688D-43BB-901A-FB9192157947", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DBD582A1-DCCF-4D54-8177-45E861A0C263", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "E5AF4FAA-A591-43FB-A9B1-FD47EF0AC622", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BC3F8EA-BE60-4EAB-A9B9-DB1368B5430C", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "C0D13359-AC5F-40CB-B906-8E03526CE045", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "A5E92FB2-7C21-4F06-AE3F-562551A758AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D213529E-33EF-43D1-A673-3C94191427D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E6539E09-4DC5-4C53-AFF1-70D06BBA9E7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "52D8DF08-AE73-4529-B212-CA31F02A719E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "EA054FCE-FABC-4EB5-9759-F77C6F250B44", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB5DDFC6-4EDF-452A-B561-C9115D91FB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "B1DBAB61-4BFB-4664-98CF-77C617F982A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "8A7580C2-44DE-48E5-AC26-A221537C95D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "54E04A5E-BE90-4A31-8C1D-09A91DD3E7DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "1A52ADD6-05DE-4A16-9745-D92CD5F46502", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFF99954-5B94-4092-83B9-7D17EEDB30A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "38A25AC3-1C81-4234-8B7E-0D59EA1F103B", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "93E670B7-6956-4A13-A2A8-F675C0B093FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*", "matchCriteriaId": "23F1C64E-1446-409D-9F53-1C03724A10E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "93813F8D-F22F-43E3-B894-BEB7FA6204F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "B280339A-1CED-4FBD-8B3C-A48B07FE9BAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "AC85766E-3A59-4711-85C9-62AC01F2A87D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "1AC9AA38-4A25-4825-9EDD-E93353A8B195", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "388E8952-47B7-426E-AE35-0216FD60CC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*", "matchCriteriaId": "105AB2DD-5E61-4369-8383-B7BF13B85444", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*", "matchCriteriaId": "FF2F4C5C-2B56-450A-813F-254019FBB854", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*", "matchCriteriaId": "226424B4-7299-4E28-BBB1-0FCC9E2602E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*", "matchCriteriaId": "C16C918C-A1C4-425B-9C0C-B239B3482A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*", "matchCriteriaId": "5393E265-60C1-43A6-9EFE-505A115053DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*", "matchCriteriaId": "1DD50D93-8395-4698-A12B-D9CAAB022BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*", "matchCriteriaId": "04EE04B4-71DD-4A87-BA2D-79954AEF5DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A968B30-8456-49C2-A9B0-6CF55CB3C7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "66BF9787-C734-43DA-B8BF-FF6D6F4E802A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "D94BF151-572F-4C50-8E47-9B8BCDD16A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5114F054-E5AF-4905-83DD-459E1D56B5DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "91B91435-67DA-49E1-A37F-7839728F17BC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow." }, { "lang": "es", "value": "Error \"Off-by-one\" en la funci\u00f3n decode_xs en Unicode/Unicode.xs en el m\u00f3dulo Encode anterior a v2.44, utilizado en Perl anterior a v5.15.6 , podr\u00eda permitir a atacantes dependientes de contexto causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un cadena de Unicode especialmente creada, provocando un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap)." } ], "id": "CVE-2011-2939", "lastModified": "2024-11-21T01:29:19.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-13T18:55:02.987", "references": [ { "source": "secalert@redhat.com", "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5" }, { "source": "secalert@redhat.com", "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/46172" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/46989" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51457" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/55314" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/49858" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1643-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_%28CVE-2011-2939%29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/46989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/55314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/08/18/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2011/08/19/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-1424.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/49858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1643-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=731246" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }