mamot.fr is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mamot.fr est un serveur Mastodon francophone, géré par La Quadrature du Net.

Server stats:

3.1K
active users

#cve_2024_56406

0 posts0 participants0 posts today
:mastodon: decio<p>⚠️ Alerte sécurité <a href="https://infosec.exchange/tags/Perl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Perl</span></a> – CVE-2024-56406</p><p>Si vous avez une solution ou un site exposé sur Internet avec Perl (v5.34 à v5.40), prenez 1 min pour lire ceci <br>⬇️ <br>Une faille heap buffer overflow dans l’opérateur tr/// permet de planter Perl via une simple ligne de code :<br>⬇️ </p><blockquote><p>perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'</p></blockquote><p>➡️ Risque d'attaque opportuniste par déni de service</p><p>🎯 Possiblement à risque si exposés:</p><ul><li><p>Portails d'hébergements mutualisés </p></li><li><p>Scripts Perl manipulant des entrées utilisateur</p></li><li><p>Stacks locales (ex : XAMPP) </p></li></ul><p>🔒 Pour se protéger :</p><p>Mettez à jour en 5.40.2 ( <a href="https://metacpan.org/release/SHAY/perl-5.40.2/changes" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">metacpan.org/release/SHAY/perl</span><span class="invisible">-5.40.2/changes</span></a>) ou 5.38.4 (<a href="https://metacpan.org/release/SHAY/perl-5.38.4/changes" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">metacpan.org/release/SHAY/perl</span><span class="invisible">-5.38.4/changes</span></a>)</p><p>cPanel <br>⬇️ <br><a href="https://docs.cpanel.net/changelogs/110-change-log/#110058" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.cpanel.net/changelogs/110</span><span class="invisible">-change-log/#110058</span></a></p><p><a href="https://infosec.exchange/tags/CyberVeille" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/cve_2024_56406" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve_2024_56406</span></a></p>
Harry Sintonen<p>CVE-2024-56406: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes.</p><p>"When there are non-ASCII bytes in the left-hand-side of the tr operator, S_do_trans_invmap() can overflow the destination pointer d.</p><p>It is believed that this vulnerability can enable Denial of Service or Arbitrary Code Execution attacks on platforms that lack sufficient defenses."</p><p>ref: <a href="https://www.openwall.com/lists/oss-security/2025/04/13/3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openwall.com/lists/oss-securit</span><span class="invisible">y/2025/04/13/3</span></a></p><p><a href="https://metacpan.org/release/SHAY/perl-5.40.2/changes" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">metacpan.org/release/SHAY/perl</span><span class="invisible">-5.40.2/changes</span></a></p><p>It's suggested releases from v5.33.1 to v5.41.10 are affected: <a href="https://www.openwall.com/lists/oss-security/2025/04/13/4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openwall.com/lists/oss-securit</span><span class="invisible">y/2025/04/13/4</span></a></p><p><a href="https://infosec.exchange/tags/cve_2024_56406" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve_2024_56406</span></a></p>