Vulnerability Details : CVE-2004-2022
ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2004-2022
Probability of exploitation activity in the next 30 days: 0.20%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 57 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-2022
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
[email protected] |
References for CVE-2004-2022
-
http://marc.info/?l=bugtraq&m=108489894009025&w=2
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16169
-
http://www.perlmonks.org/index.pl?node_id=354145
Exploit
-
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html
-
http://marc.info/?l=full-disclosure&m=108482796105922&w=2
-
http://www.securityfocus.com/bid/10375
Exploit
-
http://marc.info/?l=full-disclosure&m=108483058514596&w=2
-
http://marc.info/?l=full-disclosure&m=108489112131099&w=2
-
http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt
Exploit
Products affected by CVE-2004-2022
- cpe:2.3:a:activestate:activeperl:5.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:activestate:activeperl:5.8:*:*:*:*:*:*:*
- cpe:2.3:a:activestate:activeperl:5.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:activestate:activeperl:5.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:activestate:activeperl:5.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:activestate:activeperl:5.6.1.630:*:*:*:*:*:*:*
- cpe:2.3:a:activestate:activeperl:5.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:activestate:activeperl:5.6.3:*:*:*:*:*:*:*