Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2728 (GCVE-0-2011-2728)
Vulnerability from cvelistv5 – Published: 2012-12-21 02:00 – Updated: 2024-08-06 23:08
VLAI?
EPSS
Summary
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:08:23.771Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"name": "FEDORA-2011-15484",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html"
},
{
"name": "49858",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/49858"
},
{
"name": "46172",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/46172"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-12-21T02:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"name": "FEDORA-2011-15484",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html"
},
{
"name": "49858",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/49858"
},
{
"name": "46172",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/46172"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2728",
"datePublished": "2012-12-21T02:00:00.000Z",
"dateReserved": "2011-07-11T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:08:23.771Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-8M64-RQ77-CFMC
Vulnerability from github – Published: 2022-05-17 05:16 – Updated: 2022-05-17 05:16
VLAI?
Details
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
{
"affected": [],
"aliases": [
"CVE-2011-2728"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-12-21T05:46:00Z",
"severity": "MODERATE"
},
"details": "The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.",
"id": "GHSA-8m64-rq77-cfmc",
"modified": "2022-05-17T05:16:15Z",
"published": "2022-05-17T05:16:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2728"
},
{
"type": "WEB",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
},
{
"type": "WEB",
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html"
},
{
"type": "WEB",
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/46172"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/49858"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2011-2728
Vulnerability from fkie_nvd - Published: 2012-12-21 05:46 - Updated: 2025-04-11 00:51
Severity ?
Summary
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| perl | perl | * | |
| perl | perl | 1.00 | |
| perl | perl | 1.01 | |
| perl | perl | 1.20 | |
| perl | perl | 1.21 | |
| perl | perl | 1.22 | |
| perl | perl | 1.31 | |
| perl | perl | 1.32 | |
| perl | perl | 1.40 | |
| perl | perl | 1.41 | |
| perl | perl | 1.42 | |
| perl | perl | 1.43 | |
| perl | perl | 1.44 | |
| perl | perl | 1.45 | |
| perl | perl | 1.46 | |
| perl | perl | 1.47 | |
| perl | perl | 1.48 | |
| perl | perl | 1.49 | |
| perl | perl | 2.0.0 | |
| perl | perl | 2.1.0 | |
| perl | perl | 2.1.1 | |
| perl | perl | 2.1.2 | |
| perl | perl | 2.1.3 | |
| perl | perl | 2.2.0 | |
| perl | perl | 2.2.1 | |
| perl | perl | 2.2.2 | |
| perl | perl | 2.3.0 | |
| perl | perl | 2.4.0 | |
| perl | perl | 2.5.0 | |
| perl | perl | 2.5.1 | |
| perl | perl | 2.6.0 | |
| perl | perl | 2.6.1 | |
| perl | perl | 2.6.2 | |
| perl | perl | 2.6.3 | |
| perl | perl | 2.6.4 | |
| perl | perl | 2.6.5 | |
| perl | perl | 2.6.6 | |
| perl | perl | 2.7.0 | |
| perl | perl | 2.7.1 | |
| perl | perl | 2.7.2 | |
| perl | perl | 2.8.0 | |
| perl | perl | 2.8.1 | |
| perl | perl | 2.8.2 | |
| perl | perl | 2.8.3 | |
| perl | perl | 2.8.4 | |
| perl | perl | 2.8.5 | |
| perl | perl | 2.8.6 | |
| perl | perl | 2.8.7 | |
| perl | perl | 2.8.8 | |
| perl | perl | 2.9.0 | |
| perl | perl | 2.9.1 | |
| perl | perl | 2.9.2 | |
| perl | perl | 2.10.0 | |
| perl | perl | 2.10.1 | |
| perl | perl | 2.10.2 | |
| perl | perl | 2.10.3 | |
| perl | perl | 2.10.4 | |
| perl | perl | 2.10.5 | |
| perl | perl | 2.10.6 | |
| perl | perl | 2.10.7 | |
| perl | perl | 2.11.0 | |
| perl | perl | 2.11.1 | |
| perl | perl | 2.11.2 | |
| perl | perl | 2.11.3 | |
| perl | perl | 2.11.4 | |
| perl | perl | 2.11.5 | |
| perl | perl | 2.11.6 | |
| perl | perl | 2.11.7 | |
| perl | perl | 2.11.8 | |
| perl | perl | 2.12.0 | |
| perl | perl | 2.13.0 | |
| perl | perl | 2.14.0 | |
| perl | perl | 2.14.1 | |
| perl | perl | 2.15.0 | |
| perl | perl | 2.15.1 | |
| perl | perl | 2.16.0 | |
| perl | perl | 2.16.1 | |
| perl | perl | 2.17.0 | |
| perl | perl | 2.17.1 | |
| perl | perl | 2.17.2 | |
| perl | perl | 2.18.0 | |
| perl | perl | 2.18.1 | |
| perl | perl | 5.6.0 | |
| perl | perl | 5.6.1 | |
| perl | perl | 5.8.0 | |
| perl | perl | 5.8.1 | |
| perl | perl | 5.8.2 | |
| perl | perl | 5.8.3 | |
| perl | perl | 5.8.4 | |
| perl | perl | 5.8.5 | |
| perl | perl | 5.8.6 | |
| perl | perl | 5.8.7 | |
| perl | perl | 5.8.8 | |
| perl | perl | 5.8.9 | |
| perl | perl | 5.8.10 | |
| perl | perl | 5.9.2 | |
| perl | perl | 5.10 | |
| perl | perl | 5.10.0 | |
| perl | perl | 5.10.0 | |
| perl | perl | 5.10.0 | |
| perl | perl | 5.10.1 | |
| perl | perl | 5.10.1 | |
| perl | perl | 5.10.1 | |
| perl | perl | 5.11.0 | |
| perl | perl | 5.11.1 | |
| perl | perl | 5.11.2 | |
| perl | perl | 5.11.3 | |
| perl | perl | 5.11.4 | |
| perl | perl | 5.11.5 | |
| perl | perl | 5.12.0 | |
| perl | perl | 5.12.0 | |
| perl | perl | 5.12.0 | |
| perl | perl | 5.12.0 | |
| perl | perl | 5.12.0 | |
| perl | perl | 5.12.0 | |
| perl | perl | 5.12.0 | |
| perl | perl | 5.12.1 | |
| perl | perl | 5.12.1 | |
| perl | perl | 5.12.1 | |
| perl | perl | 5.12.2 | |
| perl | perl | 5.12.2 | |
| perl | perl | 5.12.3 | |
| perl | perl | 5.12.3 | |
| perl | perl | 5.12.3 | |
| perl | perl | 5.12.3 | |
| perl | perl | 5.13.0 | |
| perl | perl | 5.13.1 | |
| perl | perl | 5.13.2 | |
| perl | perl | 5.13.3 | |
| perl | perl | 5.13.4 | |
| perl | perl | 5.13.5 | |
| perl | perl | 5.13.6 | |
| perl | perl | 5.13.7 | |
| perl | perl | 5.13.8 | |
| perl | perl | 5.13.9 | |
| perl | perl | 5.13.10 | |
| perl | perl | 5.13.11 | |
| perl | perl | 5.14.0 | |
| perl | perl | 5.14.0 | |
| perl | perl | 5.14.0 | |
| perl | perl | 5.14.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9313BD13-82CE-4632-80E8-48B3A1159CDE",
"versionEndIncluding": "5.14.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA44592-DC6D-4FB7-AC1D-A300643922C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "5EBE0151-85BA-449C-880F-E23D8C446D8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "83F3ED90-9586-41DB-9B83-C6B05C605213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "0DB562AC-B665-4F2B-B004-9E848ACC7C20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "8305CB5A-A64A-4F11-B912-B2E428513E22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "367FF98C-12FF-4CEC-9870-6356FAD3C523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "191EDFB5-F9AB-4A8B-BFC7-9BB7BCE7AAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "A253AEB7-A581-4E1F-9410-E056390C0BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "2696ACCA-47FC-4D25-8A08-17F7CD640040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "50F9F981-903A-48F8-ACD9-48308E639261",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "99E7410D-A498-49FB-818E-309BDBDB7A21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "85BE0085-3E86-4A39-8AE4-76ED06D2534B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "2614B8FD-F7A5-4C70-AE1E-2255FCAB1154",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*",
"matchCriteriaId": "58387159-A167-4032-9F3F-B517EF2185F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*",
"matchCriteriaId": "CB414CE9-5EFA-45F7-BB0B-B8B3893444DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*",
"matchCriteriaId": "93FBE9FB-99AC-4800-BB1F-4F0689E0A07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB83944-0183-4DDB-B20E-0C8A7646A07F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80151ACD-28DC-4383-9B7E-F2B759299341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1C15294D-F2AC-4E81-A612-14A31510449D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF2EE2D3-A942-4CAE-8F14-213BB6CBD62A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "05630C5E-263A-4974-81A0-2DC178B9708C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B372AF6-29BB-4DAA-B3DA-3F8AE7BBC5BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C17CD4D0-DFE5-4C01-BEEA-891C865E18AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEB7512-D7E2-4F24-B96F-4FFE9E650262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "307F457C-4015-4857-ADB8-637BC53DEB54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B645F9A1-44FB-4504-BF6C-2810EE841025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E91B29C4-3709-473E-8F69-69D77ECEB221",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB3068F9-9A65-4DC4-88C2-19C8E1807CED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDA896A-8EA8-4924-A648-6001F83F8AB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "91611ED9-FFDE-42B2-8E02-5B089A34DB33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "638055BA-CB01-404E-B9CD-D9EEB284ACE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54F33281-2EA9-49EF-A074-E0AE93D4DC72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA4A6E5-F1A0-42E8-BB49-E06497DA582B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "085763C4-D71A-47AF-B64C-829E6EC8E6D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9805F52C-B9F4-4531-A478-C3FA03D1EA59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1183DBED-4EF7-4942-9400-D57BC0C63773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCE3D75-98D9-4D95-9EB9-F33E37CC047B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58228B5F-7FA1-42B5-BC4A-A5F6535E2C39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C7D4C885-1FDB-479C-9626-B006E1C84E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6574874E-EE2A-43B0-9D4B-9106C46BF8AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62A4C415-6408-4A7E-A1C9-8A327B0DEA59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B35E250-F525-4EF5-9DBD-D80D68E5C00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79388C94-3306-4FD2-880E-56D42830B822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E181D243-AFF0-41E3-A969-3DC67E81E8A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D445C68D-BFB8-4BAB-B995-FADF7CA5DF2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D8982A13-3F5E-4B52-932C-00BD7CEA7625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B0518BBC-BE6F-4949-A39B-1BE1FFA9442D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5F66A1-E3C6-4D89-B3E3-AF46CC98BB00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8090363F-1850-4095-A212-0A554EA37A3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "26FA77D7-CE3B-4ED2-8117-E6CC1BA39B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E4687A27-D41C-489D-AA95-E6999ABB696D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C03AD0EA-BFB8-480D-9B9C-6D6BD0DABDB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "59BADDB6-D48A-4DC0-A758-902F0EBC51CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D12770F8-8729-4712-9023-64CB2B374BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4A7FD104-1DE9-4A2A-AB2B-CD4AD9E70A93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A33D85D8-AA73-4120-9DB0-85B9E0BC14F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "079B9B47-194A-4047-AFEB-ABAD9CA5E53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "98034760-4DF2-4D7B-92D8-02EDCF56E618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB7B211-AFE1-4D1A-B46F-86394981D5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "930C1B45-2ABE-42DD-8D10-B375ED796F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B5811AB6-ED08-40C9-A0CD-77793A495E81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "82185F66-9E19-4C56-8E77-5C153275A542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E51FAC0-BEF4-4839-B3C0-CCC9ED015582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D902DF16-5F3A-485E-9409-BC47A4E46014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4A8FA7E4-B406-4587-86A7-F560FE64A3B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "77C35F36-AD3C-418C-ACED-486FF06EFFC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B28DF2CD-1BEC-4F5E-AD30-7F84E58DF223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3960D793-C3C8-40FC-83B2-710ED2F5D658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5DDE4919-FA8A-485B-9F0E-BD015B1D4D8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC022C7A-35DD-445D-B9D3-6024CF28610E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88D408D9-B90D-495A-BC09-E322FBE78E06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D00E45-E017-43AB-AAF9-9B4721CD8E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DDB7238-FD06-4872-A736-9D988A0433E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "676C7999-B586-40E0-83E8-EB09E3F107C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*",
"matchCriteriaId": "31B80A50-5766-4ED7-9254-5CDDB74C7C04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF88AD1-AECE-4227-AE63-EA3E279238C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8ED441D3-6D17-4F8E-AF0E-27D813B2C68F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22CAAB68-FD86-49DB-8DA7-F16FC3F6B878",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF19BA4-1BF5-4F1E-BE6C-318B581D1EB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EE9535-B8AB-4DC8-A012-405FDEF88CA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "51143CE7-A953-4174-B043-5D7AC7CD9391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDE0711-1423-4E75-A902-1DA04DC8C352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD62DA82-0EB3-4ACA-ACC8-A1E63C031D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4932278D-A661-42D9-AA36-4233B174EF0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "70CBBC87-F6F7-45AF-9B54-95402D03C75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B34EA51-64A3-483A-AF99-01358F6BE8D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B8E0DBA5-360F-463E-A840-365168A1FCC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA80F25-A108-4B65-BE25-56DE17B930EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ECB2B6E2-890E-4B6E-833F-DF40E6D77E22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "53F0358E-0722-48A6-A2C6-470229602089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DFDF97-EF44-448F-A5CA-021B2D64605F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E98D2706-99B7-4153-925B-77A8CECD7CFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B10AD15E-6275-48AB-8757-FB5A735C82D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7B358BF3-55AC-477E-A4B5-3960C449C011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DF69341A-4D00-424E-AD0F-FA7515278770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "777EC860-FB16-4B15-A8BE-3EAE9FD8A99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B84C088-F29F-4498-A390-187505361962",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "17E86767-47EB-4A39-B8E1-A4B9AB4BC20E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DB77E3D6-9F24-4C51-86E4-CD014DF0F66E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D67E248-C0B8-4713-9D9A-47097885A2C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B32436EE-DA64-41AD-B967-26C6D4973FC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "CF46E50D-AE29-49FD-884B-488D9EB879D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "77B23E85-8167-4B17-8D76-BD807067BB4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8355C16E-16D4-4A68-BFD3-125892E3FA1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85FFA753-4B14-4B52-941F-C33D41451EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B99FD006-688D-43BB-901A-FB9192157947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD582A1-DCCF-4D54-8177-45E861A0C263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AF4FAA-A591-43FB-A9B1-FD47EF0AC622",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC3F8EA-BE60-4EAB-A9B9-DB1368B5430C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*",
"matchCriteriaId": "C0D13359-AC5F-40CB-B906-8E03526CE045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A5E92FB2-7C21-4F06-AE3F-562551A758AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D213529E-33EF-43D1-A673-3C94191427D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E6539E09-4DC5-4C53-AFF1-70D06BBA9E7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "52D8DF08-AE73-4529-B212-CA31F02A719E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "EA054FCE-FABC-4EB5-9759-F77C6F250B44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB5DDFC6-4EDF-452A-B561-C9115D91FB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B1DBAB61-4BFB-4664-98CF-77C617F982A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8A7580C2-44DE-48E5-AC26-A221537C95D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "54E04A5E-BE90-4A31-8C1D-09A91DD3E7DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1A52ADD6-05DE-4A16-9745-D92CD5F46502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CFF99954-5B94-4092-83B9-7D17EEDB30A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38A25AC3-1C81-4234-8B7E-0D59EA1F103B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "93E670B7-6956-4A13-A2A8-F675C0B093FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "23F1C64E-1446-409D-9F53-1C03724A10E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93813F8D-F22F-43E3-B894-BEB7FA6204F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B280339A-1CED-4FBD-8B3C-A48B07FE9BAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AC85766E-3A59-4711-85C9-62AC01F2A87D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1AC9AA38-4A25-4825-9EDD-E93353A8B195",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "388E8952-47B7-426E-AE35-0216FD60CC8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "105AB2DD-5E61-4369-8383-B7BF13B85444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2F4C5C-2B56-450A-813F-254019FBB854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*",
"matchCriteriaId": "226424B4-7299-4E28-BBB1-0FCC9E2602E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C16C918C-A1C4-425B-9C0C-B239B3482A77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5393E265-60C1-43A6-9EFE-505A115053DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1DD50D93-8395-4698-A12B-D9CAAB022BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*",
"matchCriteriaId": "04EE04B4-71DD-4A87-BA2D-79954AEF5DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A968B30-8456-49C2-A9B0-6CF55CB3C7B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "66BF9787-C734-43DA-B8BF-FF6D6F4E802A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D94BF151-572F-4C50-8E47-9B8BCDD16A77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "5114F054-E5AF-4905-83DD-459E1D56B5DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference."
},
{
"lang": "es",
"value": "La funci\u00f3n bsd_glob en el m\u00f3dulo de archivo ::Glob para Perl antes de v5.14.2 permite a atacantes dependientes de contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una expresi\u00f3n regular dada con la bandera GLOB_ALTDIRFUNC, lo que desencadena una desreferencia de puntero no inicializado."
}
],
"id": "CVE-2011-2728",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-12-21T05:46:14.527",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html"
},
{
"source": "secalert@redhat.com",
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/46172"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/49858"
},
{
"source": "secalert@redhat.com",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/46172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/49858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2011-2728
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2011-2728",
"description": "The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.",
"id": "GSD-2011-2728",
"references": [
"https://www.suse.com/security/cve/CVE-2011-2728.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-2728"
],
"details": "The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.",
"id": "GSD-2011-2728",
"modified": "2023-12-13T01:19:07.021111Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2728",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod",
"refsource": "MISC",
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html",
"refsource": "MISC",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html"
},
{
"name": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77",
"refsource": "MISC",
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"name": "http://secunia.com/advisories/46172",
"refsource": "MISC",
"url": "http://secunia.com/advisories/46172"
},
{
"name": "http://www.securityfocus.com/bid/49858",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/49858"
},
{
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1",
"refsource": "MISC",
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=742987",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.14.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2728"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2011-15484",
"refsource": "FEDORA",
"tags": [],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html"
},
{
"name": "49858",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/49858"
},
{
"name": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod",
"refsource": "CONFIRM",
"tags": [],
"url": "http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod"
},
{
"name": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77",
"refsource": "MISC",
"tags": [],
"url": "http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77"
},
{
"name": "46172",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/46172"
},
{
"name": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1",
"refsource": "CONFIRM",
"tags": [],
"url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=742987",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=742987"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-01-29T05:00Z",
"publishedDate": "2012-12-21T05:46Z"
}
}
}
CERTA-2013-AVI-593
Vulnerability from certfr_avis - Published: 2013-10-18 - Updated: 2013-10-18
De multiples vulnérabilités ont été corrigées dans Oracle Solaris. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Solaris 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 11.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 10",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-4411",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4411"
},
{
"name": "CVE-2011-2728",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2728"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
}
],
"initial_release_date": "2013-10-18T00:00:00",
"last_revision_date": "2013-10-18T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-593",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Solaris\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Solaris",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 17 octobre 2013",
"url": "http://www.oracle.com/technetwork/topics/security/thirdparty-patch-map-1482893.html"
}
]
}
CVE-2011-2728
Vulnerability from fstec - Published: 21.12.2012
VLAI Severity ?
Title
Уязвимость функции bsd_glob интерпретатора языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции bsd_glob интерпретатора языка программирования Perl связана с ошибками освобождения ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании
Severity ?
Vendor
Сообщество свободного программного обеспечения
Software Name
Debian GNU/Linux, Perl
Software Version
9 (Debian GNU/Linux), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), до 5.14.2 (Perl)
Possible Mitigations
Использование рекомендаций
Для Perl:
Обновление про
граммного обеспечения до актуальной версии
Для Debian GNU/Linux:
https://security-tracker.debian.org/tracker/CVE-2011-2728
Reference
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html
http://www.securityfocus.com/bid/49858
http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77
http://secunia.com/advisories/46172
https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1
https://bugzilla.redhat.com/show_bug.cgi?id=742987
CWE
CWE-404
{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 10 (Debian GNU/Linux), 11 (Debian GNU/Linux), \u0434\u043e 5.14.2 (Perl)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439\n\u0414\u043b\u044f Perl:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\n\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2011-2728",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "21.12.2012",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.04.2022",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "27.04.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-02612",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2011-2728",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Perl",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 bsd_glob \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0430\u0442\u043e\u0440\u0430 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Perl, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 bsd_glob \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0430\u0442\u043e\u0440\u0430 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Perl \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html\nhttp://www.securityfocus.com/bid/49858\nhttp://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod\nhttp://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77\nhttp://secunia.com/advisories/46172\nhttps://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1\nhttps://bugzilla.redhat.com/show_bug.cgi?id=742987",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,7)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…