CVE-2014-4330
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
30/09/2014
Last modified:
12/04/2025
Description
The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* | 5.20.1 (including) | |
cpe:2.3:a:data_dumper_project:data_dumper:*:*:*:*:*:*:*:* | 2.151 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0406.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
- http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
- http://seclists.org/fulldisclosure/2014/Sep/84
- http://seclists.org/oss-sec/2014/q3/692
- http://secunia.com/advisories/61441
- http://secunia.com/advisories/61961
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A136
- http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
- http://www.securityfocus.com/archive/1/533543/100/0/threaded
- http://www.securityfocus.com/bid/70142
- http://www.ubuntu.com/usn/USN-2916-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- https://metacpan.org/pod/distribution/Data-Dumper/Changes
- https://www.lsexperts.de/advisories/lse-2014-06-10.txt
- http://advisories.mageia.org/MGASA-2014-0406.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html
- http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html
- http://seclists.org/fulldisclosure/2014/Sep/84
- http://seclists.org/oss-sec/2014/q3/692
- http://secunia.com/advisories/61441
- http://secunia.com/advisories/61961
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A136
- http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html
- http://www.securityfocus.com/archive/1/533543/100/0/threaded
- http://www.securityfocus.com/bid/70142
- http://www.ubuntu.com/usn/USN-2916-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96216
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- https://metacpan.org/pod/distribution/Data-Dumper/Changes
- https://www.lsexperts.de/advisories/lse-2014-06-10.txt