Secunia Security Advisory - A vulnerability has been reported in ActivePerl, which can be exploited by malicious people to cause a DoS (Denial of Service).
5fdc963b7e3c2d004df47d6b30f7708208372a3072af4828d1f7e38fcbd8ae5b
----------------------------------------------------------------------
Public Beta of CSI and WSUS Integration
http://secunia.com/blog/74
----------------------------------------------------------------------
TITLE:
ActivePerl UTF-8 Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA38558
VERIFY ADVISORY:
http://secunia.com/advisories/38558/
DESCRIPTION:
A vulnerability has been reported in ActivePerl, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error when processing strings
containing certain UTF-8 characters within regular expressions.
For more information:
SA37144
SOLUTION:
Update to ActivePerl 5.10.1 Build 1007.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
Originally reported in Perl by Mark Martinec.
ORIGINAL ADVISORY:
http://aspn.activestate.com/ASPN/Mail/Message/activeperl/3815369
OTHER REFERENCES:
SA37144:
http://secunia.com/advisories/37144/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------