SB2012011301 - Input validation error in Perl
Published: January 13, 2012 Updated: July 28, 2020
Security Bulletin ID
SB2012011301
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2011-3597)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.
Remediation
Install update from vendor's website.
References
- http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc
- http://cpansearch.perl.org/src/GAAS/Digest-1.17/Changes
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
- http://secunia.com/advisories/46279
- http://secunia.com/advisories/51457
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:008
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:009
- http://www.redhat.com/support/errata/RHSA-2011-1424.html
- http://www.redhat.com/support/errata/RHSA-2011-1797.html
- http://www.securityfocus.com/bid/49911
- http://www.ubuntu.com/usn/USN-1643-1
- https://bugzilla.redhat.com/show_bug.cgi?id=743010
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19446