Vigil@nce - Perl: denial of service via functions parameters
May 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
An attacker who is authorized to inject parameters in Perl
applications, can create a denial of service.
Severity: 1/4
Creation date: 10/05/2011
Revision date: 11/05/2011
IMPACTED PRODUCTS
– Microsoft Windows - plateform
– Unix - plateform
DESCRIPTION OF THE VULNERABILITY
The Perl environment implements the following functions:
– getpeername (), getsockname (): Socket user
– readdir (), closedir (), readdir (), rewinddir (), tell () and
telldir (): Manipulating Directory
However, if an additional parameter is passed to these functions,
they are trying to read an invalid memory address.
It may be noted that the vector of attack is relatively uncommon.
Moreover, if an attacker can modify the Perl code, it can directly
inject the code to execute.
An attacker who is authorized to inject parameters in Perl
applications, can therefore create a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Perl-denial-of-service-via-functions-parameters-10638