{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2010-4777", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[Postfixbuch-users] 20110222 proxy-reject: END-OF-MESSAGE: 451 4.3.0\tError: queue file write error", "refsource" : "MLIST", "url" : "https://listi.jpberlin.de/pipermail/postfixbuch-users/2011-February/055885.html" }, { "name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836", "refsource" : "MISC", "url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836" }, { "name" : "http://forums.ocsinventory-ng.org/viewtopic.php?id=7215", "refsource" : "MISC", "url" : "http://forums.ocsinventory-ng.org/viewtopic.php?id=7215" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=694166", "refsource" : "MISC", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=694166" }, { "name" : "https://rt.perl.org/Public/Bug/Display.html?id=76538", "refsource" : "CONFIRM", "url" : "https://rt.perl.org/Public/Bug/Display.html?id=76538" }, { "name" : "openSUSE-SU-2011:0479", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html" }, { "name" : "SUSE-SR:2011:009", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" } ] } }