Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Larry Wall Subscribe
Mandrakesoft Subscribe
Mandrake Linux Subscribe
Mandrake Linux Corporate Server Subscribe
Mandrake Multi Network Firewall Subscribe
Openpkg Subscribe
Openpkg Subscribe
Certificate System Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Linux Advanced Workstation Subscribe
Rhel Application Stack Subscribe
Rpath Linux Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-1400-1 New perl packages fix arbitrary code execution
Ubuntu USN Ubuntu USN USN-552-1 Perl vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
ftp://aix.software.ibm.com/aix/efixes/security/README cve-icon cve-icon
http://docs.info.apple.com/article.html?artnum=307179 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html cve-icon cve-icon
http://lists.vmware.com/pipermail/security-announce/2008/000002.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=120352263023774&w=2 cve-icon cve-icon
http://secunia.com/advisories/27479 cve-icon cve-icon
http://secunia.com/advisories/27515 cve-icon cve-icon
http://secunia.com/advisories/27531 cve-icon cve-icon
http://secunia.com/advisories/27546 cve-icon cve-icon
http://secunia.com/advisories/27548 cve-icon cve-icon
http://secunia.com/advisories/27570 cve-icon cve-icon
http://secunia.com/advisories/27613 cve-icon cve-icon
http://secunia.com/advisories/27756 cve-icon cve-icon
http://secunia.com/advisories/27936 cve-icon cve-icon
http://secunia.com/advisories/28167 cve-icon cve-icon
http://secunia.com/advisories/28368 cve-icon cve-icon
http://secunia.com/advisories/28387 cve-icon cve-icon
http://secunia.com/advisories/28993 cve-icon cve-icon
http://secunia.com/advisories/29074 cve-icon cve-icon
http://secunia.com/advisories/31208 cve-icon cve-icon
http://securitytracker.com/id?1018899 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2008-014.htm cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220 cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244 cve-icon cve-icon
http://www.debian.org/security/2007/dsa-1400 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml cve-icon cve-icon
http://www.ipcop.org/index.php?name=News&file=article&sid=41 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:207 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_24_sr.html cve-icon cve-icon
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-0966.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1011.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/483563/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/483584/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/485936/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/486859/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/26350 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-552-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA07-352A.html cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2008-0001.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3724 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/4238 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/4255 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0064 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0641 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=323571 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=378131 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/38270 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1813 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-5116 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-5116 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T15:17:28.328Z

Reserved: 2007-09-27T00:00:00

Link: CVE-2007-5116

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2007-11-07T23:46:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2007-5116

cve-icon Redhat

Severity : Important

Publid Date: 2007-11-05T00:00:00Z

Links: CVE-2007-5116 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses