{"id":"CVE-2018-6913","details":"Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.","modified":"2026-04-02T01:23:54.120559Z","published":"2018-04-17T20:29:00.660Z","related":["MGASA-2018-0241","MGASA-2018-0247","SUSE-SU-2018:0976-1","SUSE-SU-2018:1074-1","SUSE-SU-2018:1972-1","SUSE-SU-2018:1972-2","SUSE-SU-2024:1630-1","SUSE-SU-2024:1762-1","SUSE-SU-2024:1762-2"],"references":[{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103953"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201909-01"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3625-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4172"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040681"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html"},{"type":"ADVISORY","url":"https://rt.perl.org/Public/Bug/Display.html?id=131844"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3625-2/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/perl/perl5","events":[{"introduced":"0"},{"fixed":"c5b1997939178730653db9e80f90cd53d722fe8d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.26.2"}]}}],"versions":["GitLive-blead","GitLive-maint-5.004","GitLive-maint-5.005","GitLive-maint-5.10","GitLive-maint-5.6","GitLive-maint-5.8","code-review/2009-07-22","if-0.0602","if-0.0603","if-0.0604","if-0.0605","perl-1.0","perl-1.0.15","perl-1.0.16","perl-2.0","perl-2.001","perl-3.000","perl-3.044","perl-4.0.00","perl-4.0.36","perl-5.000","perl-5.000o","perl-5.001","perl-5.001n","perl-5.002","perl-5.002_01","perl-5.003","perl-5.003_01","perl-5.003_02","perl-5.003_03","perl-5.003_04","perl-5.003_05","perl-5.003_07","perl-5.003_08","perl-5.003_09","perl-5.003_10","perl-5.003_11","perl-5.003_12","perl-5.003_13","perl-5.003_14","perl-5.003_15","perl-5.003_16","perl-5.003_17","perl-5.003_18","perl-5.003_19","perl-5.003_20","perl-5.003_21","perl-5.003_22","perl-5.003_23","perl-5.003_24","perl-5.003_25","perl-5.003_26","perl-5.003_27","perl-5.003_28","perl-5.003_90","perl-5.003_91","perl-5.003_92","perl-5.003_93","perl-5.003_94","perl-5.003_95","perl-5.003_96","perl-5.003_97","perl-5.003_97a","perl-5.003_97b","perl-5.003_97c","perl-5.003_97d","perl-5.003_97e","perl-5.003_97f","perl-5.003_97g","perl-5.003_97h","perl-5.003_97i","perl-5.003_97j","perl-5.003_98","perl-5.003_99","perl-5.003_99a","perl-5.004","perl-5.004_01","perl-5.004_02","perl-5.004_03","perl-5.004_04","perl-5.004_05","perl-5.005","perl-5.005_01","perl-5.005_02","perl-5.005_03","perl-5.005_04","perl-5.10.0","perl-5.10.1","perl-5.10.1-RC1","perl-5.10.1-RC2","perl-5.6.0","perl-5.6.1","perl-5.6.2","perl-5.7.0","perl-5.7.1","perl-5.7.2","perl-5.7.3","perl-5.8.0","perl-5.8.1","perl-5.8.2","perl-5.8.3","perl-5.8.4","perl-5.8.5","perl-5.8.6","perl-5.8.7","perl-5.8.8","perl-5.8.9","perl-5.8.9-RC1","perl-5.9.0","perl-5.9.1","perl-5.9.2","perl-5.9.3","perl-5.9.4","perl-5.9.5","perl-5a2","perl-5a9","the_answer","timinator","timinatorII","v5.10.0","v5.10.1","v5.11.0","v5.11.1","v5.11.2","v5.11.3","v5.11.4","v5.11.5","v5.12.0","v5.12.0-RC0","v5.12.0-RC1","v5.12.0-RC2","v5.12.0-RC3","v5.12.0-RC4","v5.12.0-RC5","v5.12.1","v5.12.1-RC0","v5.12.1-RC1","v5.12.1-RC2","v5.12.2","v5.12.2-RC1","v5.12.3","v5.12.3-RC1","v5.12.3-RC2","v5.12.3-RC3","v5.12.4","v5.12.4-RC1","v5.12.4-RC2","v5.12.5","v5.12.5-RC1","v5.12.5-RC2","v5.13.0","v5.13.1","v5.13.10","v5.13.11","v5.13.2","v5.13.3","v5.13.4","v5.13.5","v5.13.6","v5.13.7","v5.13.8","v5.13.9","v5.14.0","v5.14.0-RC1","v5.14.0-RC2","v5.14.0-RC3","v5.14.1","v5.14.1-RC1","v5.14.2","v5.14.2-RC1","v5.14.3","v5.14.3-RC1","v5.14.3-RC2","v5.14.4","v5.14.4-RC1","v5.14.4-RC2","v5.15.0","v5.15.1","v5.15.2","v5.15.3","v5.15.4","v5.15.5","v5.15.6","v5.15.7","v5.15.8","v5.15.9","v5.16.0","v5.16.0-RC1","v5.16.0-RC2","v5.16.1","v5.16.2","v5.16.3","v5.16.3-RC1","v5.17.0","v5.17.1","v5.17.10","v5.17.11","v5.17.2","v5.17.3","v5.17.4","v5.17.5","v5.17.6","v5.17.7","v5.17.7.0","v5.17.8","v5.17.9","v5.18.0","v5.18.0-RC1","v5.18.0-RC2","v5.18.0-RC3","v5.18.0-RC4","v5.18.1","v5.18.2","v5.18.2-RC1","v5.18.2-RC2","v5.18.2-RC3","v5.18.2-RC4","v5.18.3","v5.18.3-RC1","v5.18.3-RC2","v5.18.4","v5.19.0","v5.19.1","v5.19.10","v5.19.11","v5.19.2","v5.19.3","v5.19.4","v5.19.5","v5.19.6","v5.19.7","v5.19.8","v5.19.9","v5.20.0","v5.20.0-RC1","v5.20.1","v5.20.1-RC1","v5.20.1-RC2","v5.20.2","v5.20.2-RC1","v5.20.3","v5.20.3-RC1","v5.20.3-RC2","v5.21.0","v5.21.1","v5.21.10","v5.21.11","v5.21.2","v5.21.3","v5.21.4","v5.21.5","v5.21.6","v5.21.7","v5.21.8","v5.21.9","v5.22.0","v5.22.0-RC1","v5.22.0-RC2","v5.22.1","v5.22.1-RC1","v5.22.1-RC2","v5.22.1-RC3","v5.22.1-RC4","v5.22.2","v5.22.2-RC1","v5.22.3","v5.22.3-RC1","v5.22.3-RC2","v5.22.3-RC3","v5.22.3-RC4","v5.22.3-RC5","v5.22.4","v5.22.4-RC1","v5.23.0","v5.23.1","v5.23.2","v5.23.3","v5.23.4","v5.23.5","v5.23.6","v5.23.7","v5.23.8","v5.23.9","v5.24.0","v5.24.0-RC1","v5.24.0-RC2","v5.24.0-RC3","v5.24.0-RC4","v5.24.0-RC5","v5.24.1","v5.24.1-RC1","v5.24.1-RC2","v5.24.1-RC3","v5.24.1-RC4","v5.24.1-RC5","v5.24.2","v5.24.2-RC1","v5.24.3","v5.24.3-RC1","v5.24.4","v5.24.4-RC1","v5.25.0","v5.25.1","v5.25.10","v5.25.11","v5.25.12","v5.25.2","v5.25.3","v5.25.4","v5.25.5","v5.25.6","v5.25.7","v5.25.8","v5.25.9","v5.26.0","v5.26.0-RC1","v5.26.0-RC2","v5.26.1","v5.26.1-RC1","v5.26.2-RC1","v5.27.0","v5.27.1","v5.27.10","v5.27.11","v5.27.2","v5.27.3","v5.27.4","v5.27.5","v5.27.6","v5.27.7","v5.27.8","v5.27.9","v5.28.0","v5.28.0-RC1","v5.28.0-RC2","v5.28.0-RC3","v5.28.0-RC4","v5.28.1","v5.28.1-RC1","v5.28.2","v5.28.2-RC1","v5.28.3","v5.28.3-RC1","v5.29.0","v5.29.1","v5.29.10","v5.29.2","v5.29.3","v5.29.4","v5.29.5","v5.29.6","v5.29.7","v5.29.8","v5.29.9","v5.30.0","v5.30.0-RC1","v5.30.0-RC2","v5.30.1","v5.30.1-RC1","v5.30.2","v5.30.2-RC1","v5.30.3","v5.30.3-RC1","v5.31.0","v5.31.1","v5.31.10","v5.31.11","v5.31.2","v5.31.3","v5.31.4","v5.31.5","v5.31.6","v5.31.7","v5.31.8","v5.31.9","v5.32.0","v5.32.0-RC0","v5.32.0-RC1","v5.32.1","v5.32.1-RC1","v5.33.0","v5.33.1","v5.33.2","v5.33.3","v5.33.4","v5.33.5","v5.33.6","v5.33.7","v5.33.8","v5.33.9","v5.34.0","v5.34.0-RC1","v5.34.0-RC2","v5.34.1","v5.34.1-RC1","v5.34.1-RC2","v5.34.2","v5.34.3","v5.35.0","v5.35.1","v5.35.10","v5.35.11","v5.35.2","v5.35.3","v5.35.4","v5.35.5","v5.35.6","v5.35.7","v5.35.8","v5.35.9","v5.36.0","v5.36.0-RC1","v5.36.0-RC3","v5.36.1","v5.36.1-RC1","v5.36.1-RC2","v5.36.1-RC3","v5.36.2","v5.36.3","v5.37.0","v5.37.1","v5.37.10","v5.37.11","v5.37.2","v5.37.3","v5.37.4","v5.37.5","v5.37.6","v5.37.7","v5.37.8","v5.37.9","v5.38.0","v5.38.0-RC1","v5.38.0-RC2","v5.38.1","v5.38.2","v5.38.3","v5.38.3-RC1","v5.38.4","v5.38.4-RC1","v5.38.5","v5.38.5-RC1","v5.39.0","v5.39.1","v5.39.10","v5.39.2","v5.39.3","v5.39.4","v5.39.5","v5.39.6","v5.39.7","v5.39.8","v5.39.9","v5.40.0","v5.40.0-RC1","v5.40.0-RC2","v5.40.1","v5.40.1-RC1","v5.40.2","v5.40.2-RC1","v5.40.3","v5.40.3-RC1","v5.40.4","v5.40.4-RC1","v5.41.0","v5.41.1","v5.41.10","v5.41.11","v5.41.12","v5.41.13","v5.41.2","v5.41.3","v5.41.4","v5.41.5","v5.41.6","v5.41.7","v5.41.8","v5.41.9","v5.42.0","v5.42.0-RC1","v5.42.0-RC2","v5.42.0-RC3","v5.42.1","v5.42.1-RC1","v5.42.2","v5.42.2-RC1","v5.43.0","v5.43.1","v5.43.2","v5.43.3","v5.43.4","v5.43.5","v5.43.6","v5.43.7","v5.43.8","v5.43.9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-6913.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}