Vulnerabilities > CVE-2011-2939 - Numeric Errors vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.

Vulnerable Configurations

Part Description Count
Application
Perl
182
Application
Dan_Kogai
118

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201401-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201401-11 (Perl, Locale Maketext Perl module: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Perl and Locale::Maketext Perl module. Please review the CVE identifiers referenced below for details. Impact : A context-dependent attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id72033
    published2014-01-20
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72033
    titleGLSA-201401-11 : Perl, Locale Maketext Perl module: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201401-11.
    #
    # The advisory text is Copyright (C) 2001-2019 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72033);
      script_version("1.9");
      script_cvs_date("Date: 2019/08/12 17:35:38");
    
      script_cve_id("CVE-2011-2728", "CVE-2011-2939", "CVE-2012-5195", "CVE-2013-1667");
      script_bugtraq_id(49858, 56287, 58311);
      script_xref(name:"GLSA", value:"201401-11");
    
      script_name(english:"GLSA-201401-11 : Perl, Locale Maketext Perl module: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201401-11
    (Perl, Locale Maketext Perl module: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in Perl and
          Locale::Maketext Perl module. Please review the CVE identifiers
          referenced below for details.
      
    Impact :
    
        A context-dependent attacker could possibly execute arbitrary code with
          the privileges of the process or cause a Denial of Service condition.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201401-11"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Perl users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=dev-lang/perl-5.16.3'
        All Locale::Maketext users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose
          '>=perl-core/locale-maketext-1.230.0'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:locale-maketext");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:perl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/01/13");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/01/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/20");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-lang/perl", unaffected:make_list("ge 5.16.3"), vulnerable:make_list("lt 5.16.3"))) flag++;
    if (qpkg_check(package:"perl-core/locale-maketext", unaffected:make_list("ge 1.230.0"), vulnerable:make_list("lt 1.230.0"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Perl / Locale Maketext Perl module");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_PERL-111122.NASL
    descriptionThis update of Perl fixes a heap based buffer overflow in the decode_xs() function (CVE-2011-2939, bnc#728662).
    last seen2020-06-01
    modified2020-06-02
    plugin id75707
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75707
    titleopenSUSE Security Update : perl (openSUSE-SU-2011:1278-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update perl-5471.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(75707);
      script_version("1.6");
      script_cvs_date("Date: 2019/10/25 13:36:41");
    
      script_cve_id("CVE-2011-2939");
    
      script_name(english:"openSUSE Security Update : perl (openSUSE-SU-2011:1278-1)");
      script_summary(english:"Check for the perl-5471 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update of Perl fixes a heap based buffer overflow in the
    decode_xs() function (CVE-2011-2939, bnc#728662)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=728662"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2011-11/msg00026.html"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected perl packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:perl-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:perl-base");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:perl-base-32bit");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2011/11/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE11\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE11.3", reference:"perl-5.12.1-2.7.1") ) flag++;
    if ( rpm_check(release:"SUSE11.3", reference:"perl-base-5.12.1-2.7.1") ) flag++;
    if ( rpm_check(release:"SUSE11.3", cpu:"x86_64", reference:"perl-32bit-5.12.1-2.7.1") ) flag++;
    if ( rpm_check(release:"SUSE11.3", cpu:"x86_64", reference:"perl-base-32bit-5.12.1-2.7.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "perl");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1424.NASL
    descriptionUpdated perl packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Perl is a high-level programming language commonly used for system administration utilities and web programming. A heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id56709
    published2011-11-04
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56709
    titleRHEL 6 : perl (RHSA-2011:1424)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-13874.NASL
    descriptionThis update fixes security bug in Digest object constructor (CVE-2011-3597)= and in decoding Unicode string by interpreter (CVE-2011-2939). ---------------------------------------------------------------------- -----= Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56696
    published2011-11-03
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56696
    titleFedora 14 : perl-5.12.4-147.fc14 (2011-13874)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_ICEDTEA-WEB-111114.NASL
    descriptionUpdate to version 1.1.4 of icedtea-web to fix the following issues : - CVE-2011-3377: IcedTea-Web: second-level domain subdomains and suffix domain SOP bypass - PR778: Jar download and server certificate verification deadlock
    last seen2020-06-01
    modified2020-06-02
    plugin id75529
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75529
    titleopenSUSE Security Update : icedtea-web (openSUSE-SU-2011:1251-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-1424.NASL
    descriptionFrom Red Hat Security Advisory 2011:1424 : Updated perl packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Perl is a high-level programming language commonly used for system administration utilities and web programming. A heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id68383
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68383
    titleOracle Linux 6 : perl (ELSA-2011-1424)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2011-19.NASL
    descriptionA heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id69578
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69578
    titleAmazon Linux AMI : perl (ALAS-2011-19)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_ICEDTEA-WEB-111114.NASL
    descriptionUpdate to version 1.1.4 of icedtea-web to fix the following issues : - CVE-2011-3377: IcedTea-Web: second-level domain subdomains and suffix domain SOP bypass - PR778: Jar download and server certificate verification deadlock
    last seen2020-06-01
    modified2020-06-02
    plugin id75865
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75865
    titleopenSUSE Security Update : icedtea-web (openSUSE-SU-2011:1251-1)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20111103_PERL_ON_SL6_X.NASL
    descriptionPerl is a high-level programming language commonly used for system administration utilities and web programming. A heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id61169
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61169
    titleScientific Linux Security Update : perl on SL6.x i386/x86_64
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_PERL-111122.NASL
    descriptionThis update of Perl fixes a heap based buffer overflow in the decode_xs() function (CVE-2011-2939, bnc#728662).
    last seen2020-06-01
    modified2020-06-02
    plugin id75994
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75994
    titleopenSUSE Security Update : perl (openSUSE-SU-2011:1278-1)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_PERL-58_20131015.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. (CVE-2004-0452) - Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree. (CVE-2005-0156) - Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452. (CVE-2005-0448) - Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. (CVE-2005-4278) - Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string. (CVE-2010-1158) - Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. (CVE-2011-2939) - CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. (CVE-2012-5526)
    last seen2020-06-01
    modified2020-06-02
    plugin id80731
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80731
    titleOracle Solaris Third-Party Patch Update : perl-58 (cve_2012_5526_configuration_vulnerability1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2012-008.NASL
    descriptionMultiple vulnerabilities has been found and corrected in perl : Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow (CVE-2011-2939). Eval injection in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor (CVE-2011-3597). The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id57593
    published2012-01-19
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57593
    titleMandriva Linux Security Advisory : perl (MDVSA-2012:008)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1643-1.NASL
    descriptionIt was discovered that the decode_xs function in the Encode module is vulnerable to a heap-based buffer overflow via a crafted Unicode string. An attacker could use this overflow to cause a denial of service. (CVE-2011-2939) It was discovered that the
    last seen2020-06-01
    modified2020-06-02
    plugin id63109
    published2012-11-30
    reporterUbuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63109
    titleUbuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : perl vulnerabilities (USN-1643-1)

Redhat

advisories
rhsa
idRHSA-2011:1424
rpms
  • perl-4:5.10.1-119.el6_1.1
  • perl-Archive-Extract-1:0.38-119.el6_1.1
  • perl-Archive-Tar-0:1.58-119.el6_1.1
  • perl-CGI-0:3.51-119.el6_1.1
  • perl-CPAN-0:1.9402-119.el6_1.1
  • perl-CPANPLUS-0:0.88-119.el6_1.1
  • perl-Compress-Raw-Zlib-0:2.023-119.el6_1.1
  • perl-Compress-Zlib-0:2.020-119.el6_1.1
  • perl-Digest-SHA-1:5.47-119.el6_1.1
  • perl-ExtUtils-CBuilder-1:0.27-119.el6_1.1
  • perl-ExtUtils-Embed-0:1.28-119.el6_1.1
  • perl-ExtUtils-MakeMaker-0:6.55-119.el6_1.1
  • perl-ExtUtils-ParseXS-1:2.2003.0-119.el6_1.1
  • perl-File-Fetch-0:0.26-119.el6_1.1
  • perl-IO-Compress-Base-0:2.020-119.el6_1.1
  • perl-IO-Compress-Zlib-0:2.020-119.el6_1.1
  • perl-IO-Zlib-1:1.09-119.el6_1.1
  • perl-IPC-Cmd-1:0.56-119.el6_1.1
  • perl-Locale-Maketext-Simple-1:0.18-119.el6_1.1
  • perl-Log-Message-1:0.02-119.el6_1.1
  • perl-Log-Message-Simple-0:0.04-119.el6_1.1
  • perl-Module-Build-1:0.3500-119.el6_1.1
  • perl-Module-CoreList-0:2.18-119.el6_1.1
  • perl-Module-Load-1:0.16-119.el6_1.1
  • perl-Module-Load-Conditional-0:0.30-119.el6_1.1
  • perl-Module-Loaded-1:0.02-119.el6_1.1
  • perl-Module-Pluggable-1:3.90-119.el6_1.1
  • perl-Object-Accessor-1:0.34-119.el6_1.1
  • perl-Package-Constants-1:0.02-119.el6_1.1
  • perl-Params-Check-1:0.26-119.el6_1.1
  • perl-Parse-CPAN-Meta-1:1.40-119.el6_1.1
  • perl-Pod-Escapes-1:1.04-119.el6_1.1
  • perl-Pod-Simple-1:3.13-119.el6_1.1
  • perl-Term-UI-0:0.20-119.el6_1.1
  • perl-Test-Harness-0:3.17-119.el6_1.1
  • perl-Test-Simple-0:0.92-119.el6_1.1
  • perl-Time-HiRes-4:1.9721-119.el6_1.1
  • perl-Time-Piece-0:1.15-119.el6_1.1
  • perl-core-0:5.10.1-119.el6_1.1
  • perl-debuginfo-4:5.10.1-119.el6_1.1
  • perl-devel-4:5.10.1-119.el6_1.1
  • perl-libs-4:5.10.1-119.el6_1.1
  • perl-parent-1:0.221-119.el6_1.1
  • perl-suidperl-4:5.10.1-119.el6_1.1
  • perl-version-3:0.77-119.el6_1.1

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 49858 CVE ID: CVE-2011-2728,CVE-2011-2939 Perl是一种高级、通用、直译式、动态的程序语言。 Perl的"decode_xs()"和"File::Glob::bsd_glob()"函数在实现上存在远程代码执行漏洞,远程攻击者可利用此漏洞执行任意代码。 1)在处理GLOB_ALTDIRFUNC旗标时,"File::Glob::bsd_glob()"函数中存在的错误可被利用造成非法访问和执行任意代码。 2)Encode中的"decode_xs()"函数中的错误可通过特制输入造成堆缓冲区溢出。 Perl 5.14.1 厂商补丁: Perl ---- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.perl.com
idSSV:20964
last seen2017-11-19
modified2011-09-30
published2011-09-30
reporterRoot
titlePerl "decode_xs()"和"File::Glob::bsd_glob()"远程代码执行漏洞