Executive Summary
Summary | |
---|---|
Title | perl security update |
Informations | |||
---|---|---|---|
Name | DSA-3501 | First vendor Publication | 2016-03-01 |
Vendor | Debian | Last vendor Modification | 2016-03-01 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Stephane Chazelas discovered a bug in the environment handling in Perl. Perl provides a Perl-space hash variable, %ENV, in which environment variables can be looked up. If a variable appears twice in envp, only the last value would appear in %ENV, but getenv would return the first. Perl's taint security mechanism would be applied to the value in %ENV, but not to the other rest of the environment. This could result in an ambiguous environment causing environment variables to be propagated to subprocesses, despite the protections supposedly offered by taint checking. With this update Perl changes the behavior to match the following: a) %ENV is populated with the first environment variable, as getenv would return. b) Duplicate environment entries are removed. For the oldstable distribution (wheezy), this problem has been fixed in version 5.14.2-21+deb7u3. For the stable distribution (jessie), this problem has been fixed in version 5.20.2-3+deb8u4. For the unstable distribution (sid), this problem will be fixed in version 5.22.1-8. We recommend that you upgrade your perl packages. |
Original Source
Url : http://www.debian.org/security/2016/dsa-3501 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-07-20 | Name : An enterprise management application installed on the remote host is affected... File : oracle_enterprise_manager_jul_2017_cpu.nasl - Type : ACT_GATHER_INFO |
2017-01-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201701-75.nasl - Type : ACT_GATHER_INFO |
2016-09-19 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1086.nasl - Type : ACT_GATHER_INFO |
2016-09-12 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2263-1.nasl - Type : ACT_GATHER_INFO |
2016-09-08 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2246-1.nasl - Type : ACT_GATHER_INFO |
2016-05-11 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_d9f99491165611e694fa002590263bf5.nasl - Type : ACT_GATHER_INFO |
2016-03-25 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-386.nasl - Type : ACT_GATHER_INFO |
2016-03-14 | Name : The remote Fedora host is missing a security update. File : fedora_2016-1fb63e3bf3.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote Fedora host is missing a security update. File : fedora_2016-5d4fc5ecc9.nasl - Type : ACT_GATHER_INFO |
2016-03-03 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2916-1.nasl - Type : ACT_GATHER_INFO |
2016-03-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3501.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-25 17:27:49 |
|
2016-04-08 21:28:43 |
|
2016-03-03 13:23:26 |
|
2016-03-01 17:27:56 |
|
2016-03-01 17:23:32 |
|