Description
ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
Product(s):
- ActiveState ActivePerl 5.6.1.630
- ActiveState ActivePerl 5.6.1
- ActiveState ActivePerl 5.6.2
- ActiveState ActivePerl 5.6.3
- ActiveState ActivePerl 5.7.1
- ActiveState ActivePerl 5.7.2
- ActiveState ActivePerl 5.7.3
- ActiveState ActivePerl 5.8
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-2022, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-2022 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.