Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2008-1927
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-23 Apr, 2008 | 17:00
Updated At-07 Aug, 2024 | 08:41
Rejected At-
▼CVE Numbering Authority (CNA)

Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2424
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31328
third-party-advisory
x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
vendor-advisory
x_refsource_FEDORA
http://osvdb.org/44588
vdb-entry
x_refsource_OSVDB
http://wiki.rpath.com/Advisories:rPSA-2009-0011
x_refsource_CONFIRM
http://secunia.com/advisories/33937
third-party-advisory
x_refsource_SECUNIA
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2008-0532.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
vdb-entry
x_refsource_XF
http://www.ubuntu.com/usn/usn-700-1
vendor-advisory
x_refsource_UBUNTU
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
vdb-entry
signature
x_refsource_OVAL
http://support.apple.com/kb/HT3438
x_refsource_CONFIRM
http://secunia.com/advisories/29948
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
vendor-advisory
x_refsource_GENTOO
http://www.securitytracker.com/id?1020253
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2361
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31467
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0522.html
vendor-advisory
x_refsource_REDHAT
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
vendor-advisory
x_refsource_FEDORA
http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
x_refsource_CONFIRM
http://secunia.com/advisories/33314
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0422
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31604
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2008-0013.html
x_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
x_refsource_CONFIRM
http://www.securityfocus.com/bid/28928
vdb-entry
x_refsource_BID
http://www.securityfocus.com/archive/1/500210/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/30624
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30025
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-700-2
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/30326
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
vendor-advisory
x_refsource_MANDRIVA
http://www.debian.org/security/2008/dsa-1556
vendor-advisory
x_refsource_DEBIAN
http://www.ipcop.org/index.php?name=News&file=article&sid=41
x_refsource_CONFIRM
http://secunia.com/advisories/31208
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2265/references
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2424
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31328
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://osvdb.org/44588
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0011
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/33937
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
Resource:
x_refsource_MISC
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0532.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.ubuntu.com/usn/usn-700-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://support.apple.com/kb/HT3438
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/29948
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.securitytracker.com/id?1020253
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2008/2361
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31467
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0522.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/33314
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/0422
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31604
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0013.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/28928
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securityfocus.com/archive/1/500210/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/30624
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30025
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-700-2
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/30326
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.debian.org/security/2008/dsa-1556
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=41
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31208
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2265/references
Resource:
vdb-entry
x_refsource_VUPEN
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2424
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31328
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://osvdb.org/44588
vdb-entry
x_refsource_OSVDB
x_transferred
http://wiki.rpath.com/Advisories:rPSA-2009-0011
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/33937
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
x_refsource_MISC
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0532.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
vdb-entry
x_refsource_XF
x_transferred
http://www.ubuntu.com/usn/usn-700-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://support.apple.com/kb/HT3438
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/29948
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.securitytracker.com/id?1020253
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2008/2361
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31467
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0522.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/33314
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/0422
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31604
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0013.html
x_refsource_CONFIRM
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/28928
vdb-entry
x_refsource_BID
x_transferred
http://www.securityfocus.com/archive/1/500210/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/30624
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30025
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-700-2
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/30326
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.debian.org/security/2008/dsa-1556
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.ipcop.org/index.php?name=News&file=article&sid=41
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31208
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2265/references
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2424
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31328
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://osvdb.org/44588
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0011
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/33937
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0532.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-700-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://support.apple.com/kb/HT3438
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/29948
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020253
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2361
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31467
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0522.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/33314
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0422
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31604
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0013.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/28928
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/500210/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/30624
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30025
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-700-2
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/30326
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1556
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=41
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31208
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2265/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Details not found