Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-47038
HistoryNov 25, 2023 - 12:00 a.m.

CVE-2023-47038

2023-11-2500:00:00
ubuntu.com
ubuntu.com
17
vulnerability
perl
regular expression
buffer overflow
unix

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs
when a crafted regular expression is compiled by perl, which can allow an
attacker controlled byte buffer overflow in a heap allocated buffer.

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchperl< 5.30.0-9ubuntu0.5UNKNOWN
ubuntu22.04noarchperl< 5.34.0-3ubuntu1.3UNKNOWN
ubuntu23.04noarchperl< 5.36.0-7ubuntu0.23.04.2UNKNOWN
ubuntu23.10noarchperl< 5.36.0-9ubuntu1.1UNKNOWN
ubuntu24.04noarchperl< 5.36.0-10ubuntu1UNKNOWN
ubuntu18.04noarchperl6< anyUNKNOWN
ubuntu20.04noarchperl6< anyUNKNOWN
ubuntu24.04noarchraku< anyUNKNOWN

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%