Vulnerability Details : CVE-2011-2728
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
Vulnerability category: Denial of service
Products affected by CVE-2011-2728
- cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*
Threat overview for CVE-2011-2728
Top countries where our scanners detected CVE-2011-2728
Top open port discovered on systems with this issue
80
IPs affected by CVE-2011-2728 361
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-2728!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-2728
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2728
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
References for CVE-2011-2728
-
http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77
Perl 5 - perl.git/commit
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html
Fedora 15 Update: perl-5.12.4-163.fc15
-
http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
-
http://www.securityfocus.com/bid/49858
Perl 'decode_xs()' and 'File::Glob::bsd_glob()' Remote Code Execution Vulnerabilities
-
https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1
CVE-2011-2728 Denial of Service (DoS) vulnerability in Perl | Oracle Third Party Vulnerability Resolution Blog
-
https://bugzilla.redhat.com/show_bug.cgi?id=742987
742987 – CVE-2011-2728 perl: File::Glob bsd_glob() crash with certain glob flags
Jump to