Vulnerability Note VU#946969
Perl programs providing user-controlled I/O format strings may contain format string vulnerabilities
Programs written in Perl may contain many of the same types of format string vulnerabilities as programs written in C.
Perl is a programming language used in many applications and commonly used for web applications. It provides many of the same functions for formatted I/O as C, including sprintf() and printf(). As a result, programs written Perl may contain format string vulnerabilities similar to the types of format string vulnerabilities found in C programs.
Note: Although there has been increased interest in this issue recently, it has been known since at least 2002 that programs written in Perl may contain format string vulnerabilities.
Perl programs that pass user data to routines that subsequently use that data as a format string may be vulnerable. Such routines include, but are not limited to, printf(), sprintf(), and syslog().
Repair Perl Program
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Perl Developers||Unknown||01 Dec 2005||01 Dec 2005|
CVSS Metrics (Learn More)
This vulnerability was reported to CERT/CC by Steve Christey of MITRE.
This document was written by Hal Burch.
- CVE IDs: Unknown
- Date Public: 05 Dec 2005
- Date First Published: 06 Dec 2005
- Date Last Updated: 04 Jan 2006
- Severity Metric: 13.77
- Document Revision: 26
If you have feedback, comments, or additional information about this vulnerability, please send us email.