Critical severity9.1NVD Advisory· Published Sep 19, 2017· Updated May 13, 2026
CVE-2017-12883
CVE-2017-12883
Description
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patchnvdPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party AdvisoryVDB Entry
- perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300fnvdPatchVendor Advisory
- www.securityfocus.com/bid/100852nvdThird Party AdvisoryVDB Entry
- perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1nvdRelease NotesVendor Advisory
- perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1nvdRelease NotesVendor Advisory
- www.debian.org/security/2017/dsa-3982nvd
- rt.perl.org/Public/Bug/Display.htmlnvd
- security.netapp.com/advisory/ntap-20180426-0001/nvd
- www.oracle.com/security-alerts/cpujul2020.htmlnvd
News mentions
0No linked articles in our index yet.