The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
| Software | From | Fixed in |
|---|---|---|
| perl / perl | 5.10 | 5.10.x |
| perl / perl | 5.14.0 | 5.14.0.x |
| perl / perl | 5.12.0 | 5.12.0.x |