Skip to main content
Version: latest

CVE-2023-47038

CVE Details

Visit the official vulnerability details page for CVE-2023-47038 to learn more.

Initial Publication

11/13/2024

Last Update

12/12/2024

Third Party Dependency

perl-base

NIST CVE Summary

A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.

CVE Severity

7.8

Our Official Summary

This vulnerability in perl can cause buffer overflow issues. For this vulnerability in Perl, a successful exploitation may involve navigating through intricate aspects of the code related to user-defined Unicode properties and executing an attack that writes past the buffer end. So the higher attack complexity implies that it would be more challenging for an attacker to exploit this vulnerability successfully, requiring a greater level of sophistication and effort.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.4.20⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
12/12/2024Official summary added