Vulnerability Details : CVE-2017-12883
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2017-12883
Probability of exploitation activity in the next 30 days: 2.03%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-12883
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2017-12883
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-12883
-
https://bugzilla.redhat.com/show_bug.cgi?id=1492093
1492093 – (CVE-2017-12883) CVE-2017-12883 perl: Buffer over-read in regular expression parserIssue Tracking;Patch;Third Party Advisory;VDB Entry
-
http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch
404 Not FoundPatch;Third Party Advisory
-
https://www.oracle.com/security-alerts/cpujul2020.html
Oracle Critical Patch Update Advisory - July 2020
-
https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1
Perl 5 - perl.git/commitdiffPatch;Vendor Advisory
-
https://rt.perl.org/Public/Bug/Display.html?id=131598
Bug #131598 for perl5: [CVE-2017-12883]Buffer over-read in S_grok_bslash_N
-
https://security.netapp.com/advisory/ntap-20180426-0001/
October 2017 Perl Vulnerabilities in NetApp Products | NetApp Product Security
-
http://www.securityfocus.com/bid/100852
Perl CVE-2017-12883 Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.debian.org/security/2017/dsa-3982
Debian -- Security Information -- DSA-3982-1 perl
-
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1
Perl 5 - perl.git/logRelease Notes;Vendor Advisory
-
https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1
Perl 5 - perl.git/logRelease Notes;Vendor Advisory
Products affected by CVE-2017-12883
- cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:5.26.0:*:*:*:*:*:*:*