Vulnerability Description
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perl | Dbi | < 1.632 |
| Canonical | Ubuntu Linux | 14.04 |
Related Weaknesses (CWE)
References
- https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f65766PatchThird Party Advisory
- https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2Release NotesThird Party Advisory
- https://rt.cpan.org/Public/Bug/Display.html?id=86744#txn-1880941Third Party Advisory
- https://usn.ubuntu.com/4509-1/Third Party Advisory
- https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f65766PatchThird Party Advisory
- https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2Release NotesThird Party Advisory
- https://rt.cpan.org/Public/Bug/Display.html?id=86744#txn-1880941Third Party Advisory
- https://usn.ubuntu.com/4509-1/Third Party Advisory
FAQ
What is CVE-2013-7490?
CVE-2013-7490 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
How severe is CVE-2013-7490?
CVE-2013-7490 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7490?
Check the references section above for vendor advisories and patch information. Affected products include: Perl Dbi, Canonical Ubuntu Linux.