Search for vulnerabilities
Vulnerability details: VCID-8hps-tvvm-aaan
Vulnerability ID VCID-8hps-tvvm-aaan
Aliases CVE-2012-5195
Summary Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2013:0685
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01745 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.01917 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.02303 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
epss 0.07151 https://api.first.org/data/v1/epss?cve=CVE-2012-5195
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=862413
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2012-5195
Reference id Reference type URL
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44
http://rhn.redhat.com/errata/RHSA-2013-0685.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5195.json
https://api.first.org/data/v1/epss?cve=CVE-2012-5195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5195
http://secunia.com/advisories/51457
http://secunia.com/advisories/55314
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352
http://www.debian.org/security/2012/dsa-2586
http://www.mandriva.com/security/advisories?name=MDVSA-2013:113
http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html
http://www.openwall.com/lists/oss-security/2012/10/26/2
http://www.openwall.com/lists/oss-security/2012/10/27/1
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/56287
http://www.ubuntu.com/usn/USN-1643-1
689314 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689314
862413 https://bugzilla.redhat.com/show_bug.cgi?id=862413
cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*
CVE-2012-5195 https://nvd.nist.gov/vuln/detail/CVE-2012-5195
GLSA-201401-11 https://security.gentoo.org/glsa/201401-11
RHSA-2013:0685 https://access.redhat.com/errata/RHSA-2013:0685
USN-1643-1 https://usn.ubuntu.com/1643-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2012-5195
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.80861
EPSS Score 0.01745
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.