Buffer Overflow Vulnerability in Perl DBI Library
CVE-2020-14393
7.1HIGH
Summary
A vulnerability exists in the Perl DBI library where a buffer overflow can occur if a local attacker submits a string exceeding 300 characters. This can lead to an out-of-bounds write, potentially impacting the service's availability and the integrity of the stored data. Affected users should upgrade to version 1.643 or later to mitigate these risks.
Affected Version(s)
perl-dbi perl-DBI before version 1.643
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved