7.5

CVE-2020-12723

regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.

Data is provided by the National Vulnerability Database (NVD)
PerlPerl Version < 5.30.3
FedoraprojectFedora Version31
OpensuseLeap Version15.1
OracleCommunications Diameter Signaling Router Version >= 8.0.0 <= 8.5.0
OracleCommunications Eagle Application Processor Version >= 16.1.0 <= 16.4.0
OracleCommunications Lsms Version >= 13.1 <= 13.4
OracleCommunications Performance Intelligence Center Version >= 10.3.0.0.0 <= 10.3.0.2.1
OracleCommunications Performance Intelligence Center Version >= 10.4.0.1.0 <= 10.4.0.3.1
OracleConfiguration Manager Version12.1.2.0.8
OracleSd-wan Edge Version8.2
OracleSd-wan Edge Version9.0
OracleSd-wan Edge Version9.1
OracleTekelec Platform Distribution Version >= 7.4.0 <= 7.7.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.18% 0.403
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.