VYPR
Unrated severityNVD Advisory· Published Dec 31, 2004· Updated Apr 16, 2026

CVE-2004-2022

CVE-2004-2022

Description

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.

Affected products

8
  • cpe:2.3:a:activestate:activeperl:5.6.1:*:*:*:*:*:*:*+ 7 more
    • cpe:2.3:a:activestate:activeperl:5.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:activestate:activeperl:5.6.1.630:*:*:*:*:*:*:*
    • cpe:2.3:a:activestate:activeperl:5.6.2:*:*:*:*:*:*:*
    • cpe:2.3:a:activestate:activeperl:5.6.3:*:*:*:*:*:*:*
    • cpe:2.3:a:activestate:activeperl:5.7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:activestate:activeperl:5.7.2:*:*:*:*:*:*:*
    • cpe:2.3:a:activestate:activeperl:5.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:activestate:activeperl:5.8:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.