Vulnerability Details : CVE-2018-18311
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2018-18311
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
- cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:e-series_santricity_os_controller:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:snapdriver:-:*:*:*:*:unix:*:*
Threat overview for CVE-2018-18311
Top countries where our scanners detected CVE-2018-18311
Top open port discovered on systems with this issue
53
IPs affected by CVE-2018-18311 733,519
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2018-18311!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-18311
0.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18311
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-18311
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18311
-
https://access.redhat.com/errata/RHSA-2019:0109
RHSA-2019:0109 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3834-1/
USN-3834-1: Perl vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://www.oracle.com/security-alerts/cpuapr2020.html
Oracle Critical Patch Update Advisory - April 2020
-
http://seclists.org/fulldisclosure/2019/Mar/49
Full Disclosure: APPLE-SA-2019-3-25-2 macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 SierraMailing List;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:0001
RHSA-2019:0001 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHBA-2019:0327
RHBA-2019:0327 - Bug Fix Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.oracle.com/security-alerts/cpujul2020.html
Oracle Critical Patch Update Advisory - July 2020
-
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Oracle Critical Patch Update - July 2019
-
http://www.securitytracker.com/id/1042181
Perl Function Integer/Heap Overflows Let Local Users Obtain Potentially Sensitive Information or Remote Users Execute Arbitrary Code in Certain Cases - SecurityTrackerThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2019:1942
RHSA-2019:1942 - Security Advisory - Red Hat Customer Portal
-
https://security.gentoo.org/glsa/201909-01
Perl: Multiple vulnerabilities (GLSA 201909-01) — Gentoo security
-
https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html
[SECURITY] [DLA 1601-1] perl security updateMailing List;Third Party Advisory
-
https://metacpan.org/changes/release/SHAY/perl-5.28.1
perldelta - what is new for perl v5.28.1 - metacpan.orgThird Party Advisory
-
https://support.apple.com/kb/HT209600
About the security content of macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra - Apple SupportThird Party Advisory
-
https://usn.ubuntu.com/3834-2/
USN-3834-2: Perl vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
[SECURITY] Fedora 29 Update: perl-5.28.1-425.fc29 - package-announce - Fedora Mailing-ListsProduct;Release Notes
-
https://access.redhat.com/errata/RHSA-2019:2400
RHSA-2019:2400 - Security Advisory - Red Hat Customer Portal
-
https://www.debian.org/security/2018/dsa-4347
Debian -- Security Information -- DSA-4347-1 perlThird Party Advisory
-
https://security.netapp.com/advisory/ntap-20190221-0003/
December 2018 PERL Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1646730
1646730 – (CVE-2018-18311) CVE-2018-18311 perl: Integer overflow leading to buffer overflow in Perl_my_setenv()Issue Tracking;Patch;Third Party Advisory
-
https://metacpan.org/changes/release/SHAY/perl-5.26.3
perldelta - what is new for perl v5.26.3 - metacpan.orgThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:0010
RHSA-2019:0010 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be
Perl_my_setenv(); handle integer wrap · Perl/perl5@34716e2 · GitHubPatch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:1790
RHSA-2019:1790 - Security Advisory - Red Hat Customer Portal
-
https://seclists.org/bugtraq/2019/Mar/42
Bugtraq: APPLE-SA-2019-3-25-2 macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 SierraMailing List;Third Party Advisory
-
https://rt.perl.org/Ticket/Display.html?id=133204
Bug #133204 for perl5: [CVE-2018-18311] Integer overflow leading to buffer overflowIssue Tracking;Third Party Advisory
-
http://www.securityfocus.com/bid/106145
Perl Multiple Buffer Overflow VulnerabilitiesThird Party Advisory;VDB Entry
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
McAfee Security Bulletin - Web Gateway update fixes four third-party vulnerabilities (CVE-2018-18311, CVE-2018-5742, CVE-2019-9169, and CVE-2019-6454)Third Party Advisory
Jump to