ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T01:15:01.203Z
Reserved: 2005-05-04T00:00:00
Link: CVE-2004-2022

No data.

Status : Modified
Published: 2004-12-31T05:00:00.000
Modified: 2024-11-20T23:52:18.750
Link: CVE-2004-2022

No data.