Andy Lester writes "Perl 5 Porters have released a fix to the sprintf function that was recently discovered to have a buffer overflow in very specific cases. All Perl users should consider updating immediately. Dyad Security recently released a security advisory explaining how in certain cases, a carefully crafted format string passed to sprintf can cause a buffer overflow. This buffer overflow can then be used by an attacker to execute code on the machine. This was discovered in the context of a design problem with the Webmin administration package that allowed a malicious user to pass unchecked data into sprintf. A related fix for Sys::Syslog has already been released."
"The Perl 5 Porters team have solved this sprintf overflow
problem, and have released a set of patches, specific to four different
versions of Perl.
Those version numbers are incomplete: it looks from your list that some versions (such as 5.8.6) aren't covered, but actually some patches cover a range of versions.
Specifically, sprintf-5.8.2.patch is for both 5.8.1 and 5.8.2, and sprintf-5.8.7.patch is for all of 5.8.4 to 5.8.7.
Smylers
Re:Intermediate Versions are Covered
petdance on 2005-12-15T15:34:12
Thanks for the note. I've updated the lists that I've posted on perlfoundation.org, and in the stories I'm submitting to Slashdot et al, to explicitly include the intermediate versions.