cve/2024/CVE-2024-56406.md

26 lines
1.6 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-56406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406)
![](https://img.shields.io/static/v1?label=Product&message=perl&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=5.33.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.39.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.41.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%20Heap-based%20Buffer%20Overflow&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%20Out-of-bounds%20Write&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.   $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped)It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
### POC
#### Reference
No PoCs from references.
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/11notes/docker-github-runner
- https://github.com/ARPSyndicate/cve-scores
2025-09-29 16:08:36 +00:00
- https://github.com/adegoodyer/kubernetes-admin-toolkit
- https://github.com/andreazorzetto/test-flask
- https://github.com/httpoz/wachturm
2025-09-29 21:09:30 +02:00
- https://github.com/runwhen-contrib/helm-charts
2025-09-29 16:08:36 +00:00