{"uuid": "85951490-3cf2-47e5-9dc7-31fabebdbdf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56406", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11563", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56406\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A heap buffer overflow vulnerability was discovered in Perl. \n\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\n\n\u00a0 \u00a0$ perl -e '$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;' \n\u00a0 \u00a0Segmentation fault (core dumped)\n\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.\n\ud83d\udccf Published: 2025-04-13T13:16:09.841Z\n\ud83d\udccf Modified: 2025-04-13T13:16:09.841Z\n\ud83d\udd17 References:\n1. https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch\n2. https://metacpan.org/release/SHAY/perl-5.38.4/changes\n3. https://metacpan.org/release/SHAY/perl-5.40.2/changes", "creation_timestamp": "2025-04-13T13:52:16.000000Z"}