Vulnerabilities > CVE-2011-3597 - Improper Input Validation vulnerability in Gisle AAS Digest

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
gisle-aas
CWE-20
nessus
exploit available

Summary

Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.

Exploit-Db

descriptionPerl 5.x Digest Module 'Digest->new()' Code Injection Vulnerability. CVE-2011-3597. Remote exploit for linux platform
idEDB-ID:36199
last seen2016-02-04
modified2011-10-02
published2011-10-02
reporteranonymous
sourcehttps://www.exploit-db.com/download/36199/
titlePerl 5.x Digest Module 'Digest->new' Code Injection Vulnerability

Nessus

  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2012-0013.NASL
    descriptiona. vCenter and ESX update to JRE 1.6.0 Update 31 The Oracle (Sun) JRE is updated to version 1.6.0_31, which addresses multiple security issues. Oracle has documented the CVE identifiers that are addressed by this update in the Oracle Java SE Critical Patch Update Advisory of February 2012. b. vCenter Update Manager update to JRE 1.5.0 Update 36 The Oracle (Sun) JRE is updated to 1.5.0_36 to address multiple security issues. Oracle has documented the CVE identifiers that are addressed in JRE 1.5.0_36 in the Oracle Java SE Critical Patch Update Advisory for June 2012. c. Update to ESX/ESXi userworld OpenSSL library The ESX/ESXi userworld OpenSSL library is updated from version 0.9.8p to version 0.9.8t to resolve multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-4180, CVE-2010-4252, CVE-2011-0014, CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, and CVE-2012-0050 to these issues. d. Update to ESX service console OpenSSL RPM The service console OpenSSL RPM is updated to version 0.9.8e-22.el5_8.3 to resolve a security issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-2110 to this issue. e. Update to ESX service console kernel The ESX service console kernel is updated to resolve multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2011-1833, CVE-2011-2484, CVE-2011-2496, CVE-2011-3188, CVE-2011-3209, CVE-2011-3363, CVE-2011-4110, CVE-2011-1020, CVE-2011-4132, CVE-2011-4324, CVE-2011-4325, CVE-2012-0207, CVE-2011-2699, and CVE-2012-1583 to these issues. f. Update to ESX service console Perl RPM The ESX service console Perl RPM is updated to perl-5.8.8.32.1.8999.vmw to resolve multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-2761, CVE-2010-4410, and CVE-2011-3597 to these issues. g. Update to ESX service console libxml2 RPMs The ESX service console libmxl2 RPMs are updated to libxml2-2.6.26-2.1.15.el5_8.2 and libxml2-python-2.6.26-2.1.15.el5_8.2 to resolve a security issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-0841 to this issue. h. Update to ESX service console glibc RPM The ESX service console glibc RPM is updated to version glibc-2.5-81.el5_8.1 to resolve multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-5029, CVE-2009-5064, CVE-2010-0830, CVE-2011-1089, CVE-2011-4609, and CVE-2012-0864 to these issue. i. Update to ESX service console GnuTLS RPM The ESX service console GnuTLS RPM is updated to version 1.4.1-7.el5_8.2 to resolve multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2011-4128, CVE-2012-1569, and CVE-2012-1573 to these issues. j. Update to ESX service console popt, rpm, rpm-libs, and rpm-python RPMS The ESX service console popt, rpm, rpm-libs, and rpm-python RPMS are updated to the following versions to resolve multiple security issues : - popt-1.10.2.3-28.el5_8 - rpm-4.4.2.3-28.el5_8 - rpm-libs-4.4.2.3-28.el5_8 - rpm-python-4.4.2.3-28.el5_8 The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-0060, CVE-2012-0061, and CVE-2012-0815 to these issues. k. Vulnerability in third-party Apache Struts component The version of Apache Struts in vCenter Operations has been updated to 2.3.4 which addresses an arbitrary file overwrite vulnerability. This vulnerability allows an attacker to create a denial of service by overwriting arbitrary files without authentication. The attacker would need to be on the same network as the system where vCOps is installed. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2012-0393 to this issue. Note: Apache struts 2.3.4 addresses the following issues as well : CVE-2011-5057, CVE-2012-0391, CVE-2012-0392, CVE-2012-0394. It was found that these do not affect vCOps. VMware would like to thank Alexander Minozhenko from ERPScan for reporting this issue to us.
    last seen2020-06-01
    modified2020-06-02
    plugin id61747
    published2012-08-31
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61747
    titleVMSA-2012-0013 : VMware vSphere and vCOps updates to third-party libraries
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from VMware Security Advisory 2012-0013. 
    # The text itself is copyright (C) VMware Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(61747);
      script_version("1.56");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/07/30");
    
      script_cve_id("CVE-2009-5029", "CVE-2009-5064", "CVE-2010-0830", "CVE-2010-2761", "CVE-2010-4180", "CVE-2010-4252", "CVE-2010-4410", "CVE-2011-0014", "CVE-2011-1020", "CVE-2011-1089", "CVE-2011-1833", "CVE-2011-2484", "CVE-2011-2496", "CVE-2011-2699", "CVE-2011-3188", "CVE-2011-3209", "CVE-2011-3363", "CVE-2011-3597", "CVE-2011-4108", "CVE-2011-4109", "CVE-2011-4110", "CVE-2011-4128", "CVE-2011-4132", "CVE-2011-4324", "CVE-2011-4325", "CVE-2011-4576", "CVE-2011-4577", "CVE-2011-4609", "CVE-2011-4619", "CVE-2012-0050", "CVE-2012-0060", "CVE-2012-0061", "CVE-2012-0207", "CVE-2012-0393", "CVE-2012-0815", "CVE-2012-0841", "CVE-2012-0864", "CVE-2012-1569", "CVE-2012-1573", "CVE-2012-1583", "CVE-2012-2110");
      script_bugtraq_id(40063, 44199, 45145, 45163, 45164, 46264, 46567, 46740, 47321, 48383, 48802, 49108, 49289, 49626, 49911, 50311, 50609, 50663, 50755, 50798, 50898, 51194, 51257, 51281, 51343, 51366, 51439, 51467, 51563, 52009, 52010, 52011, 52012, 52013, 52014, 52015, 52016, 52017, 52018, 52019, 52020, 52107, 52161, 52201, 52667, 52668, 52865, 53136, 53139, 53158, 53946, 53947, 53948, 53949, 53950, 53951, 53952, 53953, 53954, 53956, 53958, 53959, 53960);
      script_xref(name:"VMSA", value:"2012-0013");
    
      script_name(english:"VMSA-2012-0013 : VMware vSphere and vCOps updates to third-party libraries");
      script_summary(english:"Checks esxupdate output for the patches");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote VMware ESXi / ESX host is missing one or more
    security-related patches."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "a. vCenter and ESX update to JRE 1.6.0 Update 31
    
       The Oracle (Sun) JRE is updated to version 1.6.0_31, which
       addresses multiple security issues. Oracle has documented the
       CVE identifiers that are addressed by this update in the Oracle
       Java SE Critical Patch Update Advisory of February 2012.
    
    b. vCenter Update Manager update to JRE 1.5.0 Update 36
    
       The Oracle (Sun) JRE is updated to 1.5.0_36 to address multiple
       security issues.  Oracle has documented the CVE identifiers that
       are addressed in JRE 1.5.0_36 in the Oracle Java SE Critical
       Patch Update Advisory for June 2012.
    
    c. Update to ESX/ESXi userworld OpenSSL library
    
       The ESX/ESXi userworld OpenSSL library is updated from version
       0.9.8p to version 0.9.8t to resolve multiple security issues.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the names CVE-2010-4180, CVE-2010-4252,
       CVE-2011-0014, CVE-2011-4108, CVE-2011-4109, CVE-2011-4576,
       CVE-2011-4577, CVE-2011-4619, and CVE-2012-0050 to these issues.
    
    d. Update to ESX service console OpenSSL RPM
    
       The service console OpenSSL RPM is updated to version
       0.9.8e-22.el5_8.3 to resolve a security issue.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2012-2110 to this issue.
    
    e. Update to ESX service console kernel
    
       The ESX service console kernel is updated to resolve multiple
       security issues.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the names CVE-2011-1833, CVE-2011-2484,
       CVE-2011-2496, CVE-2011-3188, CVE-2011-3209, CVE-2011-3363,
       CVE-2011-4110, CVE-2011-1020, CVE-2011-4132, CVE-2011-4324,
       CVE-2011-4325, CVE-2012-0207, CVE-2011-2699, and CVE-2012-1583
       to these issues.
    
    f. Update to ESX service console Perl RPM
    
       The ESX service console Perl RPM is updated to
       perl-5.8.8.32.1.8999.vmw to resolve multiple security issues.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the names CVE-2010-2761, CVE-2010-4410, and
       CVE-2011-3597 to these issues.
    
    g. Update to ESX service console libxml2 RPMs
    
       The ESX service console libmxl2 RPMs are updated to
       libxml2-2.6.26-2.1.15.el5_8.2 and
       libxml2-python-2.6.26-2.1.15.el5_8.2 to resolve a security
       issue.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2012-0841 to this issue.
    
    h. Update to ESX service console glibc RPM
    
       The ESX service console glibc RPM is updated to version
       glibc-2.5-81.el5_8.1 to resolve multiple security issues.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
      has assigned the names CVE-2009-5029, CVE-2009-5064,
       CVE-2010-0830, CVE-2011-1089, CVE-2011-4609, and CVE-2012-0864
       to these issue.
    
    i. Update to ESX service console GnuTLS RPM
    
       The ESX service console GnuTLS RPM is updated to version
       1.4.1-7.el5_8.2 to resolve multiple security issues.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the names CVE-2011-4128, CVE-2012-1569, and
       CVE-2012-1573 to these issues.
    
    j. Update to ESX service console popt, rpm, rpm-libs,
       and rpm-python RPMS
    
       The ESX service console popt, rpm, rpm-libs, and rpm-python RPMS
       are updated to the following versions to resolve multiple
       security issues :
          - popt-1.10.2.3-28.el5_8
          - rpm-4.4.2.3-28.el5_8
          - rpm-libs-4.4.2.3-28.el5_8
          - rpm-python-4.4.2.3-28.el5_8
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org)
       has assigned the name CVE-2012-0060, CVE-2012-0061, and
       CVE-2012-0815 to these issues.
    
    k. Vulnerability in third-party Apache Struts component
    
       The version of Apache Struts in vCenter Operations has been
       updated to 2.3.4 which addresses an arbitrary file overwrite
       vulnerability. This vulnerability allows an attacker to create
       a denial of service by overwriting arbitrary files without
       authentication. The attacker would need to be on the same network
       as the system where vCOps is installed.
    
       The Common Vulnerabilities and Exposures project (cve.mitre.org) has
       assigned the name CVE-2012-0393 to this issue.
    
       Note: Apache struts 2.3.4 addresses the following issues as well :
       CVE-2011-5057, CVE-2012-0391, CVE-2012-0392, CVE-2012-0394. It
       was found that these do not affect vCOps.
    
       VMware would like to thank Alexander Minozhenko from ERPScan for
       reporting this issue to us."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.vmware.com/pipermail/security-announce/2012/000197.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply the missing patches.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Java Applet Field Bytecode Verifier Cache Remote Code Execution');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:4.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esx:4.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi:4.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:vmware:esxi:5.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/06/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2012/08/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/31");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"VMware ESX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/VMware/release", "Host/VMware/version");
      script_require_ports("Host/VMware/esxupdate", "Host/VMware/esxcli_software_vibs");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("vmware_esx_packages.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/VMware/release")) audit(AUDIT_OS_NOT, "VMware ESX / ESXi");
    if (
      !get_kb_item("Host/VMware/esxcli_software_vibs") &&
      !get_kb_item("Host/VMware/esxupdate")
    ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    init_esx_check(date:"2012-08-30");
    flag = 0;
    
    
    if (
      esx_check(
        ver           : "ESX 4.0",
        patch         : "ESX400-201209401-SG",
        patch_updates : make_list("ESX400-201302401-SG", "ESX400-201305401-SG", "ESX400-201310401-SG", "ESX400-201404401-SG")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 4.0",
        patch         : "ESX400-201209402-SG",
        patch_updates : make_list("ESX400-201305404-SG", "ESX400-201310402-SG")
      )
    ) flag++;
    if (esx_check(ver:"ESX 4.0", patch:"ESX400-201209404-SG")) flag++;
    
    if (
      esx_check(
        ver           : "ESX 4.1",
        patch         : "ESX410-201208101-SG",
        patch_updates : make_list("ESX410-201211401-SG", "ESX410-201301401-SG", "ESX410-201304401-SG", "ESX410-201307401-SG", "ESX410-201312401-SG", "ESX410-201404401-SG", "ESX410-Update03")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 4.1",
        patch         : "ESX410-201208102-SG",
        patch_updates : make_list("ESX410-201301405-SG", "ESX410-201304402-SG", "ESX410-201307405-SG", "ESX410-Update03")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 4.1",
        patch         : "ESX410-201208103-SG",
        patch_updates : make_list("ESX410-201307403-SG", "ESX410-Update03")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 4.1",
        patch         : "ESX410-201208104-SG",
        patch_updates : make_list("ESX410-Update03")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 4.1",
        patch         : "ESX410-201208105-SG",
        patch_updates : make_list("ESX410-Update03")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 4.1",
        patch         : "ESX410-201208106-SG",
        patch_updates : make_list("ESX410-201307404-SG", "ESX410-Update03")
      )
    ) flag++;
    if (
      esx_check(
        ver           : "ESX 4.1",
        patch         : "ESX410-201208107-SG",
        patch_updates : make_list("ESX410-Update03")
      )
    ) flag++;
    
    if (
      esx_check(
        ver           : "ESXi 4.1",
        patch         : "ESXi410-201208101-SG",
        patch_updates : make_list("ESXi410-201211401-SG", "ESXi410-201301401-SG", "ESXi410-201304401-SG", "ESXi410-201307401-SG", "ESXi410-201312401-SG", "ESXi410-201404401-SG", "ESXi410-Update03")
      )
    ) flag++;
    
    if (esx_check(ver:"ESXi 5.0", vib:"VMware:esx-base:5.0.0-1.25.912577")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:esx_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyAIX Local Security Checks
    NASL idAIX_IV10197.NASL
    descriptionThe Digest module for Perl is prone to a vulnerability that will let attackers inject and execute arbitrary Perl code. Remote attackers can exploit this issue to run arbitrary code in the context of the affected application. Digest versions prior to 1.17 are affected. For more details please visit : http://www.securityfocus.com/bid/49911 https://secunia.com/advisories/46279
    last seen2020-06-01
    modified2020-06-02
    plugin id64299
    published2013-01-30
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64299
    titleAIX 5.3 TL 12 : perl (IV10197)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The text in the description was extracted from AIX Security
    # Advisory perl_advisory2.asc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(64299);
      script_version("1.5");
      script_cvs_date("Date: 2019/09/16 14:13:03");
    
      script_cve_id("CVE-2011-3597");
    
      script_name(english:"AIX 5.3 TL 12 : perl (IV10197)");
      script_summary(english:"Check for APAR IV10197");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote AIX host is missing a security patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The Digest module for Perl is prone to a vulnerability that will let
    attackers inject and execute arbitrary Perl code.
    
    Remote attackers can exploit this issue to run arbitrary code in the
    context of the affected application.
    
    Digest versions prior to 1.17 are affected.
    
    For more details please visit :
    
    http://www.securityfocus.com/bid/49911
    https://secunia.com/advisories/46279"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install the appropriate interim fix."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:5.3");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2011/11/22");
      script_set_attribute(attribute:"patch_publication_date", value:"2011/11/22");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/01/30");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2019 Tenable Network Security, Inc.");
      script_family(english:"AIX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");
    
      exit(0);
    }
    
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("aix.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
    if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This iFix check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );
    
    flag = 0;
    
    if (aix_check_ifix(release:"5.3", ml:"12", patch:"IV10197610", package:"5.3.12", minfilesetver:"5.8.8.0", maxfilesetver:"5.8.8.122") < 0) flag++;
    if (aix_check_ifix(release:"6.1", ml:"05", patch:"IV10197610", package:"6.1.5", minfilesetver:"5.8.8.0", maxfilesetver:"5.8.8.122") < 0) flag++;
    if (aix_check_ifix(release:"6.1", ml:"06", patch:"IV10197610", package:"6.1.6", minfilesetver:"5.8.8.0", maxfilesetver:"5.8.8.122") < 0) flag++;
    if (aix_check_ifix(release:"6.1", ml:"07", patch:"IV10197610", package:"6.1.7", minfilesetver:"5.8.8.0", maxfilesetver:"5.8.8.122") < 0) flag++;
    if (aix_check_ifix(release:"6.1", ml:"08", patch:"IV10197610", package:"6.1.8", minfilesetver:"5.8.8.0", maxfilesetver:"5.8.8.122") < 0) flag++;
    if (aix_check_ifix(release:"7.1", ml:"00", patch:"IV10197710", package:"7.1.0", minfilesetver:"5.10.1.0", maxfilesetver:"5.10.1.50") < 0) flag++;
    if (aix_check_ifix(release:"7.1", ml:"01", patch:"IV10197710", package:"7.1.1", minfilesetver:"5.10.1.0", maxfilesetver:"5.10.1.50") < 0) flag++;
    if (aix_check_ifix(release:"7.1", ml:"02", patch:"IV10197710", package:"7.1.2", minfilesetver:"5.10.1.0", maxfilesetver:"5.10.1.50") < 0) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:aix_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1424.NASL
    descriptionUpdated perl packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Perl is a high-level programming language commonly used for system administration utilities and web programming. A heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id56709
    published2011-11-04
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56709
    titleRHEL 6 : perl (RHSA-2011:1424)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20111208_PERL_ON_SL4_X.NASL
    descriptionPerl is a high-level programming language commonly used for system administration utilities and web programming. It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id61202
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61202
    titleScientific Linux Security Update : perl on SL4.x, SL5.x i386/x86_64
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-13874.NASL
    descriptionThis update fixes security bug in Digest object constructor (CVE-2011-3597)= and in decoding Unicode string by interpreter (CVE-2011-2939). ---------------------------------------------------------------------- -----= Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56696
    published2011-11-03
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56696
    titleFedora 14 : perl-5.12.4-147.fc14 (2011-13874)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-1424.NASL
    descriptionFrom Red Hat Security Advisory 2011:1424 : Updated perl packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Perl is a high-level programming language commonly used for system administration utilities and web programming. A heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id68383
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68383
    titleOracle Linux 6 : perl (ELSA-2011-1424)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2011-19.NASL
    descriptionA heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id69578
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69578
    titleAmazon Linux AMI : perl (ALAS-2011-19)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201401-33.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201401-33 (Perl Digest-Base module: Arbitrary code execution) The vulnerability is caused due to the &ldquo;Digest->new()&rdquo; function not properly sanitising input before using it in an &ldquo;eval()&rdquo; call. Impact : The vulnerability might allow an attacker to execute arbitrary code. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id72207
    published2014-01-30
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/72207
    titleGLSA-201401-33 : Perl Digest-Base module: Arbitrary code execution
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_PERL-58_20131017_2.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor. (CVE-2011-3597)
    last seen2020-06-01
    modified2020-06-02
    plugin id80733
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80733
    titleOracle Solaris Third-Party Patch Update : perl-58 (cve_2011_3597_improper_input)
  • NASL familyMisc.
    NASL idVMWARE_VMSA-2012-0013_REMOTE.NASL
    descriptionThe remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party libraries : - Apache Struts - glibc - GnuTLS - JRE - kernel - libxml2 - OpenSSL - Perl - popt and rpm
    last seen2020-06-01
    modified2020-06-02
    plugin id89038
    published2016-02-29
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/89038
    titleVMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0013) (remote check)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20111103_PERL_ON_SL6_X.NASL
    descriptionPerl is a high-level programming language commonly used for system administration utilities and web programming. A heap-based buffer overflow flaw was found in the way Perl decoded Unicode strings. An attacker could create a malicious Unicode string that, when decoded by a Perl program, would cause the program to crash or, potentially, execute arbitrary code with the permissions of the user running the program. (CVE-2011-2939) It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id61169
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/61169
    titleScientific Linux Security Update : perl on SL6.x i386/x86_64
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2012-008.NASL
    descriptionMultiple vulnerabilities has been found and corrected in perl : Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow (CVE-2011-2939). Eval injection in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor (CVE-2011-3597). The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id57593
    published2012-01-19
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57593
    titleMandriva Linux Security Advisory : perl (MDVSA-2012:008)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1643-1.NASL
    descriptionIt was discovered that the decode_xs function in the Encode module is vulnerable to a heap-based buffer overflow via a crafted Unicode string. An attacker could use this overflow to cause a denial of service. (CVE-2011-2939) It was discovered that the
    last seen2020-06-01
    modified2020-06-02
    plugin id63109
    published2012-11-30
    reporterUbuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63109
    titleUbuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : perl vulnerabilities (USN-1643-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-1797.NASL
    descriptionUpdated perl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Perl is a high-level programming language commonly used for system administration utilities and web programming. It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id57068
    published2011-12-12
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57068
    titleCentOS 4 / 5 : perl (CESA-2011:1797)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-1797.NASL
    descriptionFrom Red Hat Security Advisory 2011:1797 : Updated perl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Perl is a high-level programming language commonly used for system administration utilities and web programming. It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id68402
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68402
    titleOracle Linux 4 / 5 : perl (ELSA-2011-1797)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1797.NASL
    descriptionUpdated perl packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Perl is a high-level programming language commonly used for system administration utilities and web programming. It was found that the
    last seen2020-06-01
    modified2020-06-02
    plugin id57053
    published2011-12-09
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57053
    titleRHEL 4 / 5 : perl (RHSA-2011:1797)

Oval

accepted2014-01-06T04:00:16.528-05:00
classvulnerability
contributors
nameChandan M C
organizationHewlett-Packard
definition_extensions
  • commentIBM AIX 5300-12 is installed
    ovaloval:org.mitre.oval:def:18390
  • commentIBM AIX 6100-05 is installed
    ovaloval:org.mitre.oval:def:19165
  • commentIBM AIX 6100-06 is installed
    ovaloval:org.mitre.oval:def:19197
  • commentIBM AIX 6100-07 is installed
    ovaloval:org.mitre.oval:def:19105
  • commentIBM AIX 6100-08 is installed
    ovaloval:org.mitre.oval:def:19215
  • commentIBM AIX 7100-00 is installed
    ovaloval:org.mitre.oval:def:19195
  • commentIBM AIX 7100-01 is installed
    ovaloval:org.mitre.oval:def:19029
  • commentIBM AIX 7100-02 is installed
    ovaloval:org.mitre.oval:def:19343
descriptionEval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.
familyunix
idoval:org.mitre.oval:def:19446
statusaccepted
submitted2013-11-18T10:06:56.357-05:00
titlePerl Digest Module Code Injection Vulnerability
version50

Redhat

advisories
  • bugzilla
    id743010
    titleCVE-2011-3597 Perl Digest improper control of generation of code
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentperl-CPAN is earlier than 0:1.9402-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424001
          • commentperl-CPAN is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558082
        • AND
          • commentperl-Digest-SHA is earlier than 1:5.47-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424003
          • commentperl-Digest-SHA is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558072
        • AND
          • commentperl-IO-Compress-Zlib is earlier than 0:2.020-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424005
          • commentperl-IO-Compress-Zlib is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558006
        • AND
          • commentperl-CPANPLUS is earlier than 0:0.88-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424007
          • commentperl-CPANPLUS is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558024
        • AND
          • commentperl-Locale-Maketext-Simple is earlier than 1:0.18-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424009
          • commentperl-Locale-Maketext-Simple is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558004
        • AND
          • commentperl-Pod-Simple is earlier than 1:3.13-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424011
          • commentperl-Pod-Simple is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558042
        • AND
          • commentperl is earlier than 4:5.10.1-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424013
          • commentperl is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558076
        • AND
          • commentperl-ExtUtils-MakeMaker is earlier than 0:6.55-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424015
          • commentperl-ExtUtils-MakeMaker is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558002
        • AND
          • commentperl-parent is earlier than 1:0.221-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424017
          • commentperl-parent is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558088
        • AND
          • commentperl-Compress-Zlib is earlier than 0:2.020-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424019
          • commentperl-Compress-Zlib is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558080
        • AND
          • commentperl-Term-UI is earlier than 0:0.20-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424021
          • commentperl-Term-UI is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558010
        • AND
          • commentperl-libs is earlier than 4:5.10.1-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424023
          • commentperl-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558040
        • AND
          • commentperl-version is earlier than 3:0.77-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424025
          • commentperl-version is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558058
        • AND
          • commentperl-Module-Build is earlier than 1:0.3500-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424027
          • commentperl-Module-Build is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558018
        • AND
          • commentperl-Archive-Tar is earlier than 0:1.58-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424029
          • commentperl-Archive-Tar is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558016
        • AND
          • commentperl-Time-Piece is earlier than 0:1.15-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424031
          • commentperl-Time-Piece is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558014
        • AND
          • commentperl-Module-CoreList is earlier than 0:2.18-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424033
          • commentperl-Module-CoreList is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558066
        • AND
          • commentperl-Log-Message-Simple is earlier than 0:0.04-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424035
          • commentperl-Log-Message-Simple is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558070
        • AND
          • commentperl-Compress-Raw-Zlib is earlier than 0:2.023-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424037
          • commentperl-Compress-Raw-Zlib is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558064
        • AND
          • commentperl-Module-Loaded is earlier than 1:0.02-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424039
          • commentperl-Module-Loaded is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558062
        • AND
          • commentperl-Module-Pluggable is earlier than 1:3.90-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424041
          • commentperl-Module-Pluggable is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558078
        • AND
          • commentperl-devel is earlier than 4:5.10.1-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424043
          • commentperl-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558050
        • AND
          • commentperl-ExtUtils-CBuilder is earlier than 1:0.27-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424045
          • commentperl-ExtUtils-CBuilder is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558074
        • AND
          • commentperl-Package-Constants is earlier than 1:0.02-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424047
          • commentperl-Package-Constants is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558026
        • AND
          • commentperl-IO-Zlib is earlier than 1:1.09-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424049
          • commentperl-IO-Zlib is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558028
        • AND
          • commentperl-Log-Message is earlier than 1:0.02-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424051
          • commentperl-Log-Message is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558034
        • AND
          • commentperl-Archive-Extract is earlier than 1:0.38-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424053
          • commentperl-Archive-Extract is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558030
        • AND
          • commentperl-IO-Compress-Base is earlier than 0:2.020-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424055
          • commentperl-IO-Compress-Base is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558008
        • AND
          • commentperl-suidperl is earlier than 4:5.10.1-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424057
          • commentperl-suidperl is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558060
        • AND
          • commentperl-Pod-Escapes is earlier than 1:1.04-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424059
          • commentperl-Pod-Escapes is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558032
        • AND
          • commentperl-IPC-Cmd is earlier than 1:0.56-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424061
          • commentperl-IPC-Cmd is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558038
        • AND
          • commentperl-File-Fetch is earlier than 0:0.26-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424063
          • commentperl-File-Fetch is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558036
        • AND
          • commentperl-core is earlier than 0:5.10.1-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424065
          • commentperl-core is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558022
        • AND
          • commentperl-CGI is earlier than 0:3.51-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424067
          • commentperl-CGI is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558084
        • AND
          • commentperl-ExtUtils-ParseXS is earlier than 1:2.2003.0-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424069
          • commentperl-ExtUtils-ParseXS is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558086
        • AND
          • commentperl-ExtUtils-Embed is earlier than 0:1.28-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424071
          • commentperl-ExtUtils-Embed is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558020
        • AND
          • commentperl-Module-Load is earlier than 1:0.16-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424073
          • commentperl-Module-Load is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558048
        • AND
          • commentperl-Module-Load-Conditional is earlier than 0:0.30-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424075
          • commentperl-Module-Load-Conditional is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558054
        • AND
          • commentperl-Parse-CPAN-Meta is earlier than 1:1.40-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424077
          • commentperl-Parse-CPAN-Meta is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558012
        • AND
          • commentperl-Test-Simple is earlier than 0:0.92-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424079
          • commentperl-Test-Simple is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558044
        • AND
          • commentperl-Object-Accessor is earlier than 1:0.34-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424081
          • commentperl-Object-Accessor is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558046
        • AND
          • commentperl-Time-HiRes is earlier than 4:1.9721-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424083
          • commentperl-Time-HiRes is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558056
        • AND
          • commentperl-Params-Check is earlier than 1:0.26-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424085
          • commentperl-Params-Check is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558068
        • AND
          • commentperl-Test-Harness is earlier than 0:3.17-119.el6_1.1
            ovaloval:com.redhat.rhsa:tst:20111424087
          • commentperl-Test-Harness is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110558052
    rhsa
    idRHSA-2011:1424
    released2011-11-03
    severityModerate
    titleRHSA-2011:1424: perl security update (Moderate)
  • bugzilla
    id743010
    titleCVE-2011-3597 Perl Digest improper control of generation of code
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • commentperl is earlier than 3:5.8.5-57.el4
            ovaloval:com.redhat.rhsa:tst:20111797001
          • commentperl is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060605002
        • AND
          • commentperl-suidperl is earlier than 3:5.8.5-57.el4
            ovaloval:com.redhat.rhsa:tst:20111797003
          • commentperl-suidperl is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060605004
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentperl-suidperl is earlier than 4:5.8.8-32.el5_7.6
            ovaloval:com.redhat.rhsa:tst:20111797006
          • commentperl-suidperl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070966007
        • AND
          • commentperl is earlier than 4:5.8.8-32.el5_7.6
            ovaloval:com.redhat.rhsa:tst:20111797008
          • commentperl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070966009
    rhsa
    idRHSA-2011:1797
    released2011-12-08
    severityModerate
    titleRHSA-2011:1797: perl security update (Moderate)
rpms
  • perl-4:5.10.1-119.el6_1.1
  • perl-Archive-Extract-1:0.38-119.el6_1.1
  • perl-Archive-Tar-0:1.58-119.el6_1.1
  • perl-CGI-0:3.51-119.el6_1.1
  • perl-CPAN-0:1.9402-119.el6_1.1
  • perl-CPANPLUS-0:0.88-119.el6_1.1
  • perl-Compress-Raw-Zlib-0:2.023-119.el6_1.1
  • perl-Compress-Zlib-0:2.020-119.el6_1.1
  • perl-Digest-SHA-1:5.47-119.el6_1.1
  • perl-ExtUtils-CBuilder-1:0.27-119.el6_1.1
  • perl-ExtUtils-Embed-0:1.28-119.el6_1.1
  • perl-ExtUtils-MakeMaker-0:6.55-119.el6_1.1
  • perl-ExtUtils-ParseXS-1:2.2003.0-119.el6_1.1
  • perl-File-Fetch-0:0.26-119.el6_1.1
  • perl-IO-Compress-Base-0:2.020-119.el6_1.1
  • perl-IO-Compress-Zlib-0:2.020-119.el6_1.1
  • perl-IO-Zlib-1:1.09-119.el6_1.1
  • perl-IPC-Cmd-1:0.56-119.el6_1.1
  • perl-Locale-Maketext-Simple-1:0.18-119.el6_1.1
  • perl-Log-Message-1:0.02-119.el6_1.1
  • perl-Log-Message-Simple-0:0.04-119.el6_1.1
  • perl-Module-Build-1:0.3500-119.el6_1.1
  • perl-Module-CoreList-0:2.18-119.el6_1.1
  • perl-Module-Load-1:0.16-119.el6_1.1
  • perl-Module-Load-Conditional-0:0.30-119.el6_1.1
  • perl-Module-Loaded-1:0.02-119.el6_1.1
  • perl-Module-Pluggable-1:3.90-119.el6_1.1
  • perl-Object-Accessor-1:0.34-119.el6_1.1
  • perl-Package-Constants-1:0.02-119.el6_1.1
  • perl-Params-Check-1:0.26-119.el6_1.1
  • perl-Parse-CPAN-Meta-1:1.40-119.el6_1.1
  • perl-Pod-Escapes-1:1.04-119.el6_1.1
  • perl-Pod-Simple-1:3.13-119.el6_1.1
  • perl-Term-UI-0:0.20-119.el6_1.1
  • perl-Test-Harness-0:3.17-119.el6_1.1
  • perl-Test-Simple-0:0.92-119.el6_1.1
  • perl-Time-HiRes-4:1.9721-119.el6_1.1
  • perl-Time-Piece-0:1.15-119.el6_1.1
  • perl-core-0:5.10.1-119.el6_1.1
  • perl-debuginfo-4:5.10.1-119.el6_1.1
  • perl-devel-4:5.10.1-119.el6_1.1
  • perl-libs-4:5.10.1-119.el6_1.1
  • perl-parent-1:0.221-119.el6_1.1
  • perl-suidperl-4:5.10.1-119.el6_1.1
  • perl-version-3:0.77-119.el6_1.1
  • perl-3:5.8.5-57.el4
  • perl-4:5.8.8-32.el5_7.6
  • perl-debuginfo-3:5.8.5-57.el4
  • perl-debuginfo-4:5.8.8-32.el5_7.6
  • perl-suidperl-3:5.8.5-57.el4
  • perl-suidperl-4:5.8.8-32.el5_7.6