cve/2024/CVE-2024-56406.md
2025-09-29 16:08:36 +00:00

21 lines
1.3 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-56406](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406)
![](https://img.shields.io/static/v1?label=Product&message=perl&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.41.0%3C%3D%205.41.10%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%20Heap-based%20Buffer%20Overflow&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%20Out-of-bounds%20Write&color=brighgreen)
### Description
A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.   $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped)It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/adegoodyer/kubernetes-admin-toolkit
- https://github.com/andreazorzetto/test-flask
- https://github.com/httpoz/wachturm