Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116 IDENTIFIER = WIND00118333
WIND00119234.zip for 2.0
WIND00121951.zip for 1.5
WINd00121950.zip for 1.4
1. Unzip the patch under [install_dir]/updates
2. Install the patch CD by entering the patch CD directory and run setup_linux.
3. This is a source only patch so you will have to build the fs
4. Issue a make fs and make the kernel in a configured directory.
5. Upload the kernel and rootfs into the target and boot it up.