High severity7.5NVD Advisory· Published Oct 5, 2016· Updated May 6, 2026
CVE-2016-1246
CVE-2016-1246
Description
Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.
Affected products
2- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2nvdIssue TrackingPatch
- security.gentoo.org/glsa/201701-51nvdPatchThird Party AdvisoryVDB Entry
- blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.htmlnvdThird Party AdvisoryVendor Advisory
- www.debian.org/security/2016/dsa-3684nvdThird Party Advisory
- www.securityfocus.com/bid/93337nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.