CVE-2005-3962

NameCVE-2005-3962
DescriptionInteger overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-943-1
NVD severitymedium (attack range: local)
Debian Bugs341542

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
perl (PTS)wheezy5.14.2-21+deb7u3fixed
wheezy (security)5.14.2-21+deb7u5fixed
jessie (security), jessie5.20.2-3+deb8u9fixed
stretch (security), stretch5.24.1-3+deb9u2fixed
buster, sid5.26.1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
perlsource(unstable)5.8.7-9medium341542
perlsourcesarge5.8.4-8sarge3mediumDSA-943-1
perlsourcewoody(not affected)DSA-943-1

Search for package or bug name: Reporting problems