CVE-2005-3962

NameCVE-2005-3962
DescriptionInteger overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-943-1
NVD severitymedium (attack range: local)
Debian Bugs341542

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
perl (PTS)wheezy5.14.2-21+deb7u3fixed
wheezy (security)5.14.2-21+deb7u6fixed
jessie5.20.2-3+deb8u9fixed
jessie (security)5.20.2-3+deb8u10fixed
stretch5.24.1-3+deb9u2fixed
stretch (security)5.24.1-3+deb9u3fixed
buster, sid5.26.2-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
perlsource(unstable)5.8.7-9medium341542
perlsourcesarge5.8.4-8sarge3mediumDSA-943-1
perlsourcewoody(not affected)DSA-943-1

Search for package or bug name: Reporting problems