DNA View

High Severity Vulnerability

This vulnerability has been rated as High severity. Immediate action is recommended.

CVE-2024-56406

High
Low Medium High Critical
8.4
CVSS Score
Published: Apr 13, 2025
Last Modified: Oct 16, 2025

Vulnerability Description

A heap buffer overflow vulnerability was discovered in Perl.

Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.

When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.

   $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'
   Segmentation fault (core dumped)

It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
L
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Known Affected Software

69 configuration(s) from 1 vendor(s)

perl
Version:
5.37.0
CPE:
cpe:2.3:a:perl:perl:5.37.0:*:*:*:*:*:*:*
perl
Version:
5.34.2
CPE:
cpe:2.3:a:perl:perl:5.34.2:*:*:*:*:*:*:*
perl
Version:
5.33.8
CPE:
cpe:2.3:a:perl:perl:5.33.8:*:*:*:*:*:*:*
perl
Version:
5.37.6
CPE:
cpe:2.3:a:perl:perl:5.37.6:*:*:*:*:*:*:*
perl
Version:
5.39.8
CPE:
cpe:2.3:a:perl:perl:5.39.8:*:*:*:*:*:*:*
perl
Version:
5.35.3
CPE:
cpe:2.3:a:perl:perl:5.35.3:*:*:*:*:*:*:*
perl
Version:
5.33.4
CPE:
cpe:2.3:a:perl:perl:5.33.4:*:*:*:*:*:*:*
perl
Version:
5.38.3
CPE:
cpe:2.3:a:perl:perl:5.38.3:-:*:*:*:*:*:*
perl
Version:
5.37.9
CPE:
cpe:2.3:a:perl:perl:5.37.9:*:*:*:*:*:*:*
perl
Version:
5.39.6
CPE:
cpe:2.3:a:perl:perl:5.39.6:*:*:*:*:*:*:*
perl
Version:
5.41.6
CPE:
cpe:2.3:a:perl:perl:5.41.6:*:*:*:*:*:*:*
perl
Version:
5.41.9
CPE:
cpe:2.3:a:perl:perl:5.41.9:*:*:*:*:*:*:*
perl
Version:
5.38.1
CPE:
cpe:2.3:a:perl:perl:5.38.1:*:*:*:*:*:*:*
perl
Version:
5.37.11
CPE:
cpe:2.3:a:perl:perl:5.37.11:*:*:*:*:*:*:*
perl
Version:
5.39.1
CPE:
cpe:2.3:a:perl:perl:5.39.1:*:*:*:*:*:*:*
perl
Version:
5.37.10
CPE:
cpe:2.3:a:perl:perl:5.37.10:*:*:*:*:*:*:*
perl
Version:
5.34.1
CPE:
cpe:2.3:a:perl:perl:5.34.1:rc2:*:*:*:*:*:*
perl
Version:
5.35.8
CPE:
cpe:2.3:a:perl:perl:5.35.8:*:*:*:*:*:*:*
perl
Version:
5.35.9
CPE:
cpe:2.3:a:perl:perl:5.35.9:*:*:*:*:*:*:*
perl
Version:
5.33.2
CPE:
cpe:2.3:a:perl:perl:5.33.2:*:*:*:*:*:*:*
perl
Version:
5.41.4
CPE:
cpe:2.3:a:perl:perl:5.41.4:*:*:*:*:*:*:*
perl
Version:
5.39.4
CPE:
cpe:2.3:a:perl:perl:5.39.4:*:*:*:*:*:*:*
perl
Version:
5.35.4
CPE:
cpe:2.3:a:perl:perl:5.35.4:*:*:*:*:*:*:*
perl
Version:
5.35.0
CPE:
cpe:2.3:a:perl:perl:5.35.0:*:*:*:*:*:*:*
perl
Version:
5.41.8
CPE:
cpe:2.3:a:perl:perl:5.41.8:*:*:*:*:*:*:*
perl
Version:
5.38.0
CPE:
cpe:2.3:a:perl:perl:5.38.0:-:*:*:*:*:*:*
perl
Version:
5.41.7
CPE:
cpe:2.3:a:perl:perl:5.41.7:*:*:*:*:*:*:*
perl
Version:
5.41.0
CPE:
cpe:2.3:a:perl:perl:5.41.0:*:*:*:*:*:*:*
perl
Version:
5.35.5
CPE:
cpe:2.3:a:perl:perl:5.35.5:*:*:*:*:*:*:*
perl
Version:
5.37.2
CPE:
cpe:2.3:a:perl:perl:5.37.2:*:*:*:*:*:*:*
perl
Version:
5.34.3
CPE:
cpe:2.3:a:perl:perl:5.34.3:*:*:*:*:*:*:*
perl
Version:
5.39.0
CPE:
cpe:2.3:a:perl:perl:5.39.0:*:*:*:*:*:*:*
perl
Version:
5.34.0
CPE:
cpe:2.3:a:perl:perl:5.34.0:-:*:*:*:*:*:*
perl
Version:
5.37.7
CPE:
cpe:2.3:a:perl:perl:5.37.7:*:*:*:*:*:*:*
perl
Version:
5.41.3
CPE:
cpe:2.3:a:perl:perl:5.41.3:*:*:*:*:*:*:*
perl
Version:
5.38.2
CPE:
cpe:2.3:a:perl:perl:5.38.2:*:*:*:*:*:*:*
perl
Version:
5.41.5
CPE:
cpe:2.3:a:perl:perl:5.41.5:*:*:*:*:*:*:*
perl
Version:
5.33.7
CPE:
cpe:2.3:a:perl:perl:5.33.7:*:*:*:*:*:*:*
perl
Version:
5.41.10
CPE:
cpe:2.3:a:perl:perl:5.41.10:*:*:*:*:*:*:*
perl
Version:
5.37.3
CPE:
cpe:2.3:a:perl:perl:5.37.3:*:*:*:*:*:*:*
perl
Version:
5.35.1
CPE:
cpe:2.3:a:perl:perl:5.35.1:*:*:*:*:*:*:*
perl
Version:
5.33.1
CPE:
cpe:2.3:a:perl:perl:5.33.1:*:*:*:*:*:*:*
perl
Version:
5.39.2
CPE:
cpe:2.3:a:perl:perl:5.39.2:*:*:*:*:*:*:*
perl
Version:
5.36.3
CPE:
cpe:2.3:a:perl:perl:5.36.3:*:*:*:*:*:*:*
perl
Version:
5.37.4
CPE:
cpe:2.3:a:perl:perl:5.37.4:*:*:*:*:*:*:*
perl
Version:
5.36.0
CPE:
cpe:2.3:a:perl:perl:5.36.0:-:*:*:*:*:*:*
perl
Version:
5.33.9
CPE:
cpe:2.3:a:perl:perl:5.33.9:*:*:*:*:*:*:*
perl
Version:
5.37.8
CPE:
cpe:2.3:a:perl:perl:5.37.8:*:*:*:*:*:*:*
perl
Version:
5.37.1
CPE:
cpe:2.3:a:perl:perl:5.37.1:*:*:*:*:*:*:*
perl
Version:
5.33.3
CPE:
cpe:2.3:a:perl:perl:5.33.3:*:*:*:*:*:*:*
perl
Version:
5.39.5
CPE:
cpe:2.3:a:perl:perl:5.39.5:*:*:*:*:*:*:*
perl
Version:
5.33.5
CPE:
cpe:2.3:a:perl:perl:5.33.5:*:*:*:*:*:*:*
perl
Version:
5.33.6
CPE:
cpe:2.3:a:perl:perl:5.33.6:*:*:*:*:*:*:*
perl
Version:
5.40.1
CPE:
cpe:2.3:a:perl:perl:5.40.1:-:*:*:*:*:*:*
perl
Version:
5.36.2
CPE:
cpe:2.3:a:perl:perl:5.36.2:*:*:*:*:*:*:*
perl
Version:
5.40.0
CPE:
cpe:2.3:a:perl:perl:5.40.0:-:*:*:*:*:*:*
perl
Version:
5.35.10
CPE:
cpe:2.3:a:perl:perl:5.35.10:*:*:*:*:*:*:*
perl
Version:
5.35.6
CPE:
cpe:2.3:a:perl:perl:5.35.6:*:*:*:*:*:*:*
perl
Version:
5.37.5
CPE:
cpe:2.3:a:perl:perl:5.37.5:*:*:*:*:*:*:*
perl
Version:
5.36.1
CPE:
cpe:2.3:a:perl:perl:5.36.1:rc3:*:*:*:*:*:*
perl
Version:
5.39.10
CPE:
cpe:2.3:a:perl:perl:5.39.10:*:*:*:*:*:*:*
perl
Version:
5.35.2
CPE:
cpe:2.3:a:perl:perl:5.35.2:*:*:*:*:*:*:*
perl
Version:
5.35.11
CPE:
cpe:2.3:a:perl:perl:5.35.11:*:*:*:*:*:*:*
perl
Version:
5.39.3
CPE:
cpe:2.3:a:perl:perl:5.39.3:*:*:*:*:*:*:*
perl
Version:
5.39.7
CPE:
cpe:2.3:a:perl:perl:5.39.7:*:*:*:*:*:*:*
perl
Version:
5.39.9
CPE:
cpe:2.3:a:perl:perl:5.39.9:*:*:*:*:*:*:*
perl
Version:
5.41.1
CPE:
cpe:2.3:a:perl:perl:5.41.1:*:*:*:*:*:*:*
perl
Version:
5.41.2
CPE:
cpe:2.3:a:perl:perl:5.41.2:*:*:*:*:*:*:*
perl
Version:
5.35.7
CPE:
cpe:2.3:a:perl:perl:5.35.7:*:*:*:*:*:*:*
This vulnerability affects 69 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

5 patches available from vendors

View All Patches
Oracle

CPUAPR2026

Oracle Critical Patch Update Advisory - April 2026

Severity
Critical
Released
Apr 21, 2026
Restart Required
Security Update
Oracle

CPUJAN2026

Oracle Critical Patch Update Advisory - January 2026

Severity
Critical
Released
Jan 20, 2026
Restart Required
Security Update
Oracle

CPUOCT2025

Oracle Critical Patch Update Advisory - October 2025

Severity
Critical
Released
Oct 21, 2025
Restart Required
Security Update
Microsoft

2025-Apr-CVE-2024-56406

CVE-2024-56406: Perl is vulnerable to a heap buffer overflow when transliterating non-ASCII bytes

Severity
Unknown
Released
Oct 01, 2025
Security Update
Oracle

CPUJUL2025

Oracle Critical Patch Update Advisory - July 2025

Severity
Critical
Released
Jul 15, 2025
Restart Required
Security Update

Severity Details

8.4
out of 10.0
High

Weakness Type (CWE)

CWE-122

Heap-based Buffer Overflow

Description
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Exploit Likelihood
High
Typical Severity
High
Abstraction Level
Variant

Key Information

Published Date
April 13, 2025