Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

An attacker who can fully or partially control the contents of a format string can crash the Perl interpreter, or cause a denial of service. She can also modify values, perhaps by using the %n|| conversion specifier, and use these values to divert control flow. Their capabilities are not as strong as in C [Seacord 2005]; nonetheless the danger is sufficiently great that the formatted output functions {{sprintf() and printf() should never be passed unsanitized format strings.

...

MITRE CWE: CWE-134, "Uncontrolled format string"

Bibliography

[Christey 2005] Format string vulnerabilities in Perl programs
[Seacord 2005] Chapter 6, "Formatted Output"
[VU#948385] "Perl contains an integer sign error in format string processing"
[Wall 2011] perlfunc

...

01. Input Validation and Data Sanitization    01. Input Validation and Data Sanitization     02. Declarations and Initialization