Impact
The vulnerability is an integer overflow flaw that occurs on 32‑bit systems when the Perl module Crypt::NaCl::Sodium casts a STRLEN (size_t) to an unsigned long long before passing it to libsodium functions. This incorrect type conversion can produce a length value that is too large for the actual buffer, leading to potential memory corruption. The flaw is classified as CWE-190 and carries a CVSS score of 9.1, indicating a severe risk that could allow an attacker to potentially execute arbitrary code or crash the application if exploited. The exact exploitation steps are not specified, but the likely attack vector is through any application that imports and uses the affected module, exploiting the distorted length parameter.
Affected Systems
The affected product is the Perl module Crypt::NaCl::Sodium from vendor TIMLEGGE. Versions up to and including 2.001 on 32‑bit platforms are impacted. The recommended safe version is 2.002 and later. The vulnerability affects only 32‑bit operating systems; 64‑bit systems are not susceptible due to the difference in size_t length.
Risk and Exploitability
With a CVSS score of 9.1 and an EPSS score of less than 1%, the probability of active exploitation is low but not negligible, and the vulnerability is not currently listed in the CISA KEV catalog. The combination of a very low exploitation probability and a severe severity score still necessitates prompt remediation. Inference indicates that the exploit requires a 32‑bit build and an application that relies on the Crypt::NaCl::Sodium module, making it less likely to be widely exploited across all Perl deployments. However, because memory corruption can lead to unpredictable behavior—including potential remote code execution—the risk remains significant if the module is used in sensitive or high‑privilege contexts.
OpenCVE Enrichment