CVE-2011-2939

Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.1 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
VendorProductVersion
dan_kogaiencode_module
𝑥
≤ 2.43
dan_kogaiencode_module
0.93
dan_kogaiencode_module
0.94
dan_kogaiencode_module
0.95
dan_kogaiencode_module
0.96
dan_kogaiencode_module
0.97
dan_kogaiencode_module
0.98
dan_kogaiencode_module
0.99
dan_kogaiencode_module
1.00
dan_kogaiencode_module
1.01
dan_kogaiencode_module
1.10
dan_kogaiencode_module
1.11
dan_kogaiencode_module
1.20
dan_kogaiencode_module
1.21
dan_kogaiencode_module
1.25
dan_kogaiencode_module
1.26
dan_kogaiencode_module
1.28
dan_kogaiencode_module
1.30
dan_kogaiencode_module
1.31
dan_kogaiencode_module
1.32
dan_kogaiencode_module
1.33
dan_kogaiencode_module
1.34
dan_kogaiencode_module
1.40
dan_kogaiencode_module
1.41
dan_kogaiencode_module
1.42
dan_kogaiencode_module
1.50
dan_kogaiencode_module
1.51
dan_kogaiencode_module
1.52
dan_kogaiencode_module
1.53
dan_kogaiencode_module
1.54
dan_kogaiencode_module
1.55
dan_kogaiencode_module
1.56
dan_kogaiencode_module
1.57
dan_kogaiencode_module
1.58
dan_kogaiencode_module
1.59
dan_kogaiencode_module
1.60
dan_kogaiencode_module
1.61
dan_kogaiencode_module
1.62
dan_kogaiencode_module
1.63
dan_kogaiencode_module
1.64
dan_kogaiencode_module
1.65
dan_kogaiencode_module
1.66
dan_kogaiencode_module
1.67
dan_kogaiencode_module
1.68
dan_kogaiencode_module
1.69
dan_kogaiencode_module
1.70
dan_kogaiencode_module
1.71
dan_kogaiencode_module
1.72
dan_kogaiencode_module
1.73
dan_kogaiencode_module
1.74
dan_kogaiencode_module
1.75
dan_kogaiencode_module
1.76
dan_kogaiencode_module
1.77
dan_kogaiencode_module
1.78
dan_kogaiencode_module
1.79
dan_kogaiencode_module
1.80
dan_kogaiencode_module
1.81
dan_kogaiencode_module
1.82
dan_kogaiencode_module
1.83
dan_kogaiencode_module
1.84
dan_kogaiencode_module
1.85
dan_kogaiencode_module
1.86
dan_kogaiencode_module
1.87
dan_kogaiencode_module
1.88
dan_kogaiencode_module
1.89
dan_kogaiencode_module
1.90
dan_kogaiencode_module
1.91
dan_kogaiencode_module
1.92
dan_kogaiencode_module
1.93
dan_kogaiencode_module
1.94
dan_kogaiencode_module
1.95
dan_kogaiencode_module
1.96
dan_kogaiencode_module
1.97
dan_kogaiencode_module
1.98
dan_kogaiencode_module
1.99
dan_kogaiencode_module
2.0
dan_kogaiencode_module
2.01
dan_kogaiencode_module
2.02
dan_kogaiencode_module
2.03
dan_kogaiencode_module
2.04
dan_kogaiencode_module
2.05
dan_kogaiencode_module
2.06
dan_kogaiencode_module
2.07
dan_kogaiencode_module
2.08
dan_kogaiencode_module
2.09
dan_kogaiencode_module
2.10
dan_kogaiencode_module
2.11
dan_kogaiencode_module
2.12
dan_kogaiencode_module
2.13
dan_kogaiencode_module
2.14
dan_kogaiencode_module
2.15
dan_kogaiencode_module
2.16
dan_kogaiencode_module
2.17
dan_kogaiencode_module
2.18
dan_kogaiencode_module
2.19
dan_kogaiencode_module
2.20
dan_kogaiencode_module
2.21
dan_kogaiencode_module
2.22
dan_kogaiencode_module
2.23
dan_kogaiencode_module
2.24
dan_kogaiencode_module
2.25
dan_kogaiencode_module
2.26
dan_kogaiencode_module
2.27
dan_kogaiencode_module
2.28
dan_kogaiencode_module
2.29
dan_kogaiencode_module
2.30
dan_kogaiencode_module
2.31
dan_kogaiencode_module
2.32
dan_kogaiencode_module
2.33
dan_kogaiencode_module
2.34
dan_kogaiencode_module
2.35
dan_kogaiencode_module
2.36
dan_kogaiencode_module
2.37
dan_kogaiencode_module
2.38
dan_kogaiencode_module
2.39
dan_kogaiencode_module
2.40
dan_kogaiencode_module
2.41
dan_kogaiencode_module
2.42
perlperl
𝑥
≤ 5.14.2
perlperl
5.8.1
perlperl
5.8.2
perlperl
5.8.3
perlperl
5.8.4
perlperl
5.8.5
perlperl
5.8.6
perlperl
5.8.7
perlperl
5.8.8
perlperl
5.8.9
perlperl
5.8.10
perlperl
5.9.2
perlperl
5.10
perlperl
5.10.0
perlperl
5.10.0:rc1
perlperl
5.10.0:rc2
perlperl
5.10.1
perlperl
5.10.1:rc1
perlperl
5.10.1:rc2
perlperl
5.11.0
perlperl
5.11.1
perlperl
5.11.2
perlperl
5.11.3
perlperl
5.11.4
perlperl
5.11.5
perlperl
5.12.0
perlperl
5.12.0:rc0
perlperl
5.12.0:rc1
perlperl
5.12.0:rc2
perlperl
5.12.0:rc3
perlperl
5.12.0:rc4
perlperl
5.12.0:rc5
perlperl
5.12.1
perlperl
5.12.1:rc1
perlperl
5.12.1:rc2
perlperl
5.12.2
perlperl
5.12.2:rc1
perlperl
5.12.3
perlperl
5.12.3:rc1
perlperl
5.12.3:rc2
perlperl
5.12.3:rc3
perlperl
5.13.0
perlperl
5.13.1
perlperl
5.13.2
perlperl
5.13.3
perlperl
5.13.4
perlperl
5.13.5
perlperl
5.13.6
perlperl
5.13.7
perlperl
5.13.8
perlperl
5.13.9
perlperl
5.13.10
perlperl
5.13.11
perlperl
5.14.0
perlperl
5.14.0:rc1
perlperl
5.14.0:rc2
perlperl
5.14.0:rc3
perlperl
5.14.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libencode-perl
bullseye
3.08-1+deb11u2
fixed
lenny
no-dsa
bullseye (security)
3.08-1+deb11u1
fixed
bookworm
3.19-1
fixed
sid
3.21-1
fixed
trixie
3.21-1
fixed
perl
bullseye
5.32.1-4+deb11u3
fixed
lenny
no-dsa
bullseye (security)
5.32.1-4+deb11u4
fixed
bookworm
5.36.0-7+deb12u1
fixed
sid
5.40.0-6
fixed
trixie
5.40.0-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
perl
quantal
not-affected
precise
not-affected
oneiric
not-affected
natty
ignored
maverick
ignored
lucid
Fixed 5.10.1-8ubuntu2.2
released
hardy
not-affected
Common Weakness Enumeration
References