CVE-2013-1667
14.03.2013, 03:13
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.Enginsight
Vendor | Product | Version |
---|---|---|
perl | perl | 5.8.2 |
perl | perl | 5.8.3 |
perl | perl | 5.8.4 |
perl | perl | 5.8.5 |
perl | perl | 5.8.6 |
perl | perl | 5.8.7 |
perl | perl | 5.8.8 |
perl | perl | 5.8.9 |
perl | perl | 5.8.10 |
perl | perl | 5.10 |
perl | perl | 5.10.0 |
perl | perl | 5.10.0:rc1 |
perl | perl | 5.10.0:rc2 |
perl | perl | 5.10.1 |
perl | perl | 5.10.1:rc1 |
perl | perl | 5.10.1:rc2 |
perl | perl | 5.11.0 |
perl | perl | 5.11.1 |
perl | perl | 5.11.2 |
perl | perl | 5.11.3 |
perl | perl | 5.11.4 |
perl | perl | 5.11.5 |
perl | perl | 5.12.0 |
perl | perl | 5.12.0:rc0 |
perl | perl | 5.12.0:rc1 |
perl | perl | 5.12.0:rc2 |
perl | perl | 5.12.0:rc3 |
perl | perl | 5.12.0:rc4 |
perl | perl | 5.12.0:rc5 |
perl | perl | 5.12.1 |
perl | perl | 5.12.1:rc1 |
perl | perl | 5.12.1:rc2 |
perl | perl | 5.12.2 |
perl | perl | 5.12.2:rc1 |
perl | perl | 5.12.3 |
perl | perl | 5.12.3:rc1 |
perl | perl | 5.12.3:rc2 |
perl | perl | 5.12.3:rc3 |
perl | perl | 5.12.4 |
perl | perl | 5.13.0 |
perl | perl | 5.13.1 |
perl | perl | 5.13.2 |
perl | perl | 5.13.3 |
perl | perl | 5.13.4 |
perl | perl | 5.13.5 |
perl | perl | 5.13.6 |
perl | perl | 5.13.7 |
perl | perl | 5.13.8 |
perl | perl | 5.13.9 |
perl | perl | 5.13.10 |
perl | perl | 5.13.11 |
perl | perl | 5.14.0 |
perl | perl | 5.14.0:rc1 |
perl | perl | 5.14.0:rc2 |
perl | perl | 5.14.0:rc3 |
perl | perl | 5.14.1 |
perl | perl | 5.14.2 |
perl | perl | 5.14.3 |
perl | perl | 5.16.0 |
perl | perl | 5.16.1 |
perl | perl | 5.16.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References