{"vuid":"VU#722414","idnumber":"722414","name":"Perl vulnerable to buffer overflow in win32_stat()","keywords":["Perl","buffer overflow","win32_stat"],"overview":"A flaw in a standard function in some Perl distributions could allow an attacker to execute arbitrary code on the vulnerable system.","clean_desc":"The stat() Perl function, similar to the standard C stat() function, returns a list giving the status info for a file. Since the stat() function is UNIX-centric, some Perl distributions supply a function named win32_stat() that provides a wrapper around the stat() function for systems running Perl on Windows operating systems. A buffer overflow flaw in the way win32_stat() handles long filenames could allow an attacker to execute code on a system running an application that used the function. Note that because this flaw exists in the Perl system itself, a vulnerability is only exposed through a Perl application that invokes win32_stat() (either explicitly or implicitly) on a filename supplied by the user. Since the flawed code does not get complied into Perl builds for UNIX systems, only systems running Perl on Windows are affected.","impact":"An attacker may be able to execute arbitrary code in the context of an application that uses the vulnerable function. The scope of the impact depends on how the affected application works. Applications that process filename input from the network, such as some web applications, would be vulnerable to a remote attacker. Applications that only process filename input from a local user would only be vulnerable to a local attacker.","resolution":"Apply a patch Patches have been developed to address this issue. For more information, see: <http://public.activestate.com/cgi-bin/perlbrowse?patch=22466> (for the 5.9.x branch) <http://public.activestate.com/cgi-bin/perlbrowse?patch=22552> (for the 5.8.x branch) Note that these patches require the user to recompile the Perl interpreter for their system after application.","workarounds":"","sysaffected":"","thanks":"Thanks to Greg MacManus of \niDEFENSE Labs\n for reporting this vulnerability.","author":"This document was written by Chad R Dougherty based primarily on information provided by iDEFENSE.","public":["h","t","t","p",":","/","/","w","w","w",".","i","d","e","f","e","n","s","e",".","c","o","m","/","a","p","p","l","i","c","a","t","i","o","n","/","p","o","i","/","d","i","s","p","l","a","y","?","i","d","=","9","3","&","t","y","p","e","=","v","u","l","n","e","r","a","b","i","l","i","t","i","e","s"],"cveids":["CVE-2004-0377"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-04-05T17:57:51Z","publicdate":"2004-05-05T00:00:00Z","datefirstpublished":"2004-06-09T14:15:57Z","dateupdated":"2004-07-16T14:13:07Z","revision":21,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"18","cam_easeofexploitation":"8","cam_attackeraccessrequired":"20","cam_scorecurrent":"13.5","cam_scorecurrentwidelyknown":"16.2","cam_scorecurrentwidelyknownexploited":"27","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.5,"vulnote":null}