Description
Storable versions before 3.05 for Perl has a stack overflow.

The retrieve_hook function stored the length of the class name into a signed integer but in read operations treated the length as unsigned. This allowed an attacker to craft data that could trigger the overflow.
Published: 2026-04-21
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Potential for arbitrary code execution due to stack corruption
Action: Patch ASAP
AI Analysis

Impact

The Storable module in Perl suffered a vulnerability that triggers a stack overflow in versions prior to 3.05. The retrieve_hook routine stores the class name length as a signed integer but later interprets it as unsigned during read operations, allowing an attacker to engineer data that overflows the stack. This corruption can lead to the replacement of execution pointers or other critical data, potentially enabling arbitrary code execution within the context of the affected Perl process.

Affected Systems

Affected products include the Perl Storable module distributed by the NWCLARK:Storable vendor. Any installation of Storable 3.04 or earlier is vulnerable. The concern applies to all systems running Perl applications that import or deserialize Storable data from untrusted sources.

Risk and Exploitability

The CVSS score is 10, indicating critical severity. The EPSS score is unavailable, so the likelihood of exploitation is uncertain, and the vulnerability is not listed in the CISA KEV catalog. Exploitation would require the attacker to supply crafted Storable data to a vulnerable Perl program, which may be possible through local file uploads or remote input depending on the application’s design. Based on the description, the likely attack vector is through deserialization of maliciously constructed data.

Generated by OpenCVE AI on April 22, 2026 at 05:39 UTC.

Remediation

Vendor Solution

Upgrade to Storable version 3.05 or newer.


OpenCVE Recommended Actions

  • Upgrade the Storable module to version 3.05 or newer
  • Restrict deserialization of Storable data to inputs from trusted sources only, isolating any untrusted data handling in a sandboxed environment
  • If immediate upgrade is not feasible, replace Storable with a vetted alternative serialization library and disable unsafe deserialization functions

Generated by OpenCVE AI on April 22, 2026 at 05:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-190
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 22 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:nwclark:storable:*:*:*:*:*:perl:*:*

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Nwclark
Nwclark storable
Vendors & Products Nwclark
Nwclark storable

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
References

Tue, 21 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description Storable versions before 3.05 for Perl has a stack overflow. The retrieve_hook function stored the length of the class name into a signed integer but in read operations treated the length as unsigned. This allowed an attacker to craft data that could trigger the overflow.
Title Storable versions before 3.05 for Perl has a stack overflow
Weaknesses CWE-121
References

Subscriptions

Nwclark Storable
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-04-21T18:22:25.354Z

Reserved: 2026-03-28T19:24:26.125Z

Link: CVE-2017-20230

cve-icon Vulnrichment

Updated: 2026-04-21T18:22:25.354Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T16:16:18.077

Modified: 2026-04-22T17:36:04.653

Link: CVE-2017-20230

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-21T15:26:18Z

Links: CVE-2017-20230 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:46:19Z

Weaknesses