Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2020-06-05 14:15
Updated : 2022-05-12 15:00
NVD link : CVE-2020-10878
Mitre link : CVE-2020-10878
JSON object : View
Products Affected
oracle
- communications_eagle_lnp_application_processor
- communications_eagle_application_processor
- communications_performance_intelligence_center
- communications_lsms
- communications_billing_and_revenue_management
- communications_pricing_design_center
- communications_diameter_signaling_router
- enterprise_manager_base_platform
- communications_offline_mediation_controller
- configuration_manager
- tekelec_platform_distribution
- sd-wan_aware
perl
- perl
fedoraproject
- fedora
netapp
- snap_creator_framework
- oncommand_workflow_automation
opensuse
- leap
CWE
CWE-190
Integer Overflow or Wraparound
