Vulnerability Details : CVE-2012-5195
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2012-5195
- cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5195
1.92%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5195
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2012-5195
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5195
-
http://rhn.redhat.com/errata/RHSA-2013-0685.html
RHSA-2013:0685 - Security Advisory - Red Hat Customer Portal
-
http://www.debian.org/security/2012/dsa-2586
Debian -- Security Information -- DSA-2586-1 perl
-
http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44
Perl 5 - perl.git/commitPatch;Vendor Advisory
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView
-
http://www.securityfocus.com/bid/56287
Perl CVE-2012-5195 Heap-Based Memory Corruption Vulnerability
-
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
maint-5.12, maint-5.14, and CVE-2012-5195 - nntp.perl.org
-
http://www.openwall.com/lists/oss-security/2012/10/26/2
oss-security - Medium severity flaw with Perl 5
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
Juniper Networks - 2016-04 Security Bulletin: CTP Series: Multiple vulnerabilities in CTP Series
-
http://www.ubuntu.com/usn/USN-1643-1
USN-1643-1: Perl vulnerabilities | Ubuntu security notices
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
Juniper Networks - 2015-04 Security Bulletin: IDP: Multiple vulnerabilities addressed by third party software updates.
-
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352
Support/Advisories/MGASA-2012-0352 - Mageia wiki
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016
-
http://www.openwall.com/lists/oss-security/2012/10/27/1
oss-security - Re: Medium severity flaw with Perl 5
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:113
mandriva.com
Jump to