If I understand this correctly, the only way to exploit this is if code uses tainted input inside the format parameter of one of Perl's printf family of functions.
Granted, this is still a bug, and will have to be patched; but it seems like this is only an issue if code is already using a practice known to carry security risks. Or am I missing something?
In reply to Re: Searching for sprintf() bug exploit opportunities in core and CPAN modules
by radiantmatrix
in thread Searching for sprintf() bug exploit opportunities in core and CPAN modules
by diotalevi
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |