Vulnerability Description
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perl | Perl | < 5.26.3 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 9.0 |
| Redhat | Enterprise Linux | 6.0 |
| Netapp | E-Series Santricity Os Controller | >= 11.0, <= 11.40 |
| Netapp | Snap Creator Framework | - |
| Netapp | Snapcenter | - |
| Netapp | Snapdrive | - |
| Apple | Mac Os X | < 10.14.4 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2019/Mar/49Third Party Advisory
- http://www.securitytracker.com/id/1042181Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:0001Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0010Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1646738Issue TrackingPatchThird Party Advisory
- https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62PatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://metacpan.org/changes/release/SHAY/perl-5.26.3Third Party Advisory
- https://rt.perl.org/Ticket/Display.html?id=133192ExploitThird Party Advisory
- https://seclists.org/bugtraq/2019/Mar/42Mailing ListThird Party Advisory
- https://security.gentoo.org/glsa/201909-01
- https://security.netapp.com/advisory/ntap-20190221-0003/Third Party Advisory
- https://support.apple.com/kb/HT209600Third Party Advisory
- https://usn.ubuntu.com/3834-1/Third Party Advisory
- https://usn.ubuntu.com/3834-2/Third Party Advisory
FAQ
What is CVE-2018-18313?
CVE-2018-18313 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
How severe is CVE-2018-18313?
CVE-2018-18313 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-18313?
Check the references section above for vendor advisories and patch information. Affected products include: Perl Perl, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Enterprise Linux, Netapp E-Series Santricity Os Controller.