VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-091028-001
Invalid and tainted utf-8 char crashes perl 5.10.1 in regexp evaluation
http://rt.perl.org/rt3//Public/Bug/Display.html?id=69973

Tracking down a reason for crashes of a perl process while processing certain obfuscated spam messages, it turns out that an utf-8 character with a large (and invalid) codepoint is causing a perl 5.10.1 crash while matching such string to a particular regular expression.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-10-28
Source Information Category:
Advisory, Alert
Last Updated:
2009-10-28




Affected Product Tags
lapt:/a:perl:perl     (Perl)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

X Low-Medium [?]
Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
X Complex [?]

Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.