This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Dan Kogai First view 2012-01-13
Product Encode Module Last view 2012-01-13
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:dan_kogai:encode_module:2.21:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.51:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.32:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.31:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.11:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.10:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:0.94:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:0.93:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.38:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.37:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.30:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.29:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.22:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.52:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.20:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.13:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.12:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.05:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.04:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.96:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.95:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.88:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.87:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.80:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.79:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.00:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.02:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.41:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.34:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.33:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.36:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.35:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.28:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.27:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.19:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.18:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.11:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.10:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.03:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:2.42:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.94:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.93:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.86:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.85:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.78:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.77:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.69:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.68:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.61:*:*:*:*:*:*:* 1
cpe:2.3:a:dan_kogai:encode_module:1.60:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
5.1 2012-01-13 CVE-2011-2939

Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.

CWE : Common Weakness Enumeration

%idName
100% (1) CWE-189 Numeric Errors

Open Source Vulnerability Database (OSVDB)

id Description
76724 Perl Encode decode_xs() Function Input Parsing Remote Overflow

OpenVAS Exploits

id Description
2012-12-04 Name : Ubuntu Update for perl USN-1643-1
File : nvt/gb_ubuntu_USN_1643_1.nasl
2012-07-09 Name : RedHat Update for perl RHSA-2011:1424-01
File : nvt/gb_RHSA-2011_1424-01_perl.nasl
2012-01-20 Name : Mandriva Update for perl MDVSA-2012:008 (perl)
File : nvt/gb_mandriva_MDVSA_2012_008.nasl
2012-01-17 Name : Strawberry Perl Modules Multiple Vulnerabilities (Windows)
File : nvt/gb_perl_modules_mult_vuln_win.nasl
2011-11-03 Name : Fedora Update for perl FEDORA-2011-13874
File : nvt/gb_fedora_2011_13874_perl_fc14.nasl

Nessus® Vulnerability Scanner

id Description
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_perl-58_20131015.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: suse_11_3_icedtea-web-111114.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: suse_11_3_perl-111122.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: suse_11_4_icedtea-web-111114.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote openSUSE host is missing a security update.
File: suse_11_4_perl-111122.nasl - Type: ACT_GATHER_INFO
2014-01-20 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201401-11.nasl - Type: ACT_GATHER_INFO
2013-09-04 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2011-19.nasl - Type: ACT_GATHER_INFO
2013-07-12 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2011-1424.nasl - Type: ACT_GATHER_INFO
2012-11-30 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-1643-1.nasl - Type: ACT_GATHER_INFO
2012-08-01 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20111103_perl_on_SL6_x.nasl - Type: ACT_GATHER_INFO
2012-01-19 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2012-008.nasl - Type: ACT_GATHER_INFO
2011-11-04 Name: The remote host is missing the patch for the advisory RHSA-2011-1424
File: redhat-RHSA-2011-1424.nasl - Type: ACT_GATHER_INFO
2011-11-03 Name: The remote Fedora host is missing a security update.
File: fedora_2011-13874.nasl - Type: ACT_GATHER_INFO