Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2004-2022


ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.


Published

2004-12-31T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 2.1 (LOW)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application activestate activeperl 5.6.1 Yes
Application activestate activeperl 5.6.1.630 Yes
Application activestate activeperl 5.6.2 Yes
Application activestate activeperl 5.6.3 Yes
Application activestate activeperl 5.7.1 Yes
Application activestate activeperl 5.7.2 Yes
Application activestate activeperl 5.7.3 Yes
Application activestate activeperl 5.8 Yes

References