CVE-2005-3962

NameCVE-2005-3962
DescriptionInteger overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-943-1
NVD severitymedium (attack range: local)
Debian Bugs341542

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
perl (PTS)wheezy5.14.2-21+deb7u3fixed
wheezy (security)5.14.2-21+deb7u5fixed
jessie5.20.2-3+deb8u8fixed
jessie (security)5.20.2-3+deb8u9fixed
stretch (security), stretch5.24.1-3+deb9u2fixed
buster, sid5.26.0-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
perlsource(unstable)5.8.7-9medium341542
perlsourcesarge5.8.4-8sarge3mediumDSA-943-1
perlsourcewoody(not affected)DSA-943-1

Search for package or bug name: Reporting problems