Search for vulnerabilities
Vulnerability details: VCID-waf6-9awy-aaaa
Vulnerability ID VCID-waf6-9awy-aaaa
Aliases CVE-2011-0761
Summary Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.
Status Published
Exploitability 2.0
Weighted Severity 4.5
Risk 9.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.01682 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02968 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02968 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02968 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.02999 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.04279 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.04279 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.04279 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
epss 0.07005 https://api.first.org/data/v1/epss?cve=CVE-2011-0761
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=704994
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2011-0761
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0761.json
https://api.first.org/data/v1/epss?cve=CVE-2011-0761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0761
http://securityreason.com/securityalert/8248
http://securitytracker.com/id?1025507
https://exchange.xforce.ibmcloud.com/vulnerabilities/67355
http://www.securityfocus.com/archive/1/517916/100/0/threaded
http://www.securityfocus.com/bid/47766
http://www.toucan-system.com/advisories/tssa-2011-03.txt
628817 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628817
704994 https://bugzilla.redhat.com/show_bug.cgi?id=704994
cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*
CVE-2011-0761 https://nvd.nist.gov/vuln/detail/CVE-2011-0761
CVE-2011-0761;OSVDB-74175 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/35725.pl
CVE-2011-0761;OSVDB-74175 Exploit https://www.securityfocus.com/bid/47766/info
GLSA-201311-17 https://security.gentoo.org/glsa/201311-17
Data source Exploit-DB
Date added May 3, 2011
Description Perl 5.10 - Multiple Null Pointer Dereference Denial of Service Vulnerabilities
Ransomware campaign use Known
Source publication date May 3, 2011
Exploit type dos
Platform multiple
Source update date Jan. 8, 2015
Source URL https://www.securityfocus.com/bid/47766/info
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2011-0761
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.88086
EPSS Score 0.01682
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.