Executive Summary
Summary | |
---|---|
Title | Perl vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-1129-1 | First vendor Publication | 2011-05-03 |
Vendor | Ubuntu | Last vendor Modification | 2011-05-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.5 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS - Ubuntu 6.06 LTS Summary: An attacker could send crafted input to Perl and bypass intended restrictions. Software Description: - perl: Larry Wall's Practical Extraction and Report Language Details: It was discovered that the Safe.pm Perl module incorrectly handled Safe::reval and Safe::rdo access restrictions. An attacker could use this flaw to bypass intended restrictions and possibly execute arbitrary code. (CVE-2010-1168, CVE-2010-1447) It was discovered that the CGI.pm Perl module incorrectly handled certain MIME boundary strings. An attacker could use this flaw to inject arbitrary HTTP headers and perform HTTP response splitting and cross-site scripting attacks. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 10.04 LTS and 10.10. (CVE-2010-2761, CVE-2010-4411) It was discovered that the CGI.pm Perl module incorrectly handled newline characters. An attacker could use this flaw to inject arbitrary HTTP headers and perform HTTP response splitting and cross-site scripting attacks. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 10.04 LTS and 10.10. (CVE-2010-4410) It was discovered that the lc, lcfirst, uc, and ucfirst functions did not properly apply the taint attribute when processing tainted input. An attacker could use this flaw to bypass intended restrictions. This issue only affected Ubuntu 8.04 LTS, 10.04 LTS and 10.10. (CVE-2011-1487) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: Ubuntu 10.10: Ubuntu 10.04 LTS: Ubuntu 8.04 LTS: Ubuntu 6.06 LTS: In general, a standard system update will make all the necessary changes. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-1129-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
60 % | CWE-264 | Permissions, Privileges, and Access Controls |
40 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11530 | |||
Oval ID: | oval:org.mitre.oval:def:11530 | ||
Title: | The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. | ||
Description: | The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1447 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13030 | |||
Oval ID: | oval:org.mitre.oval:def:13030 | ||
Title: | DSA-2267-1 perl -- restriction bypass | ||
Description: | It was discovered that Perl's Safe module - a module to compile and execute code in restricted compartments - could by bypassed. Please note that this update is known to break Petal, an XML-based templating engine. A fix is not yet available. If you use Petal, you might consider to put the previous Perl packages on hold. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2267-1 CVE-2010-1447 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | perl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13047 | |||
Oval ID: | oval:org.mitre.oval:def:13047 | ||
Title: | DSA-2265-1 perl -- lack of tainted flag propagation | ||
Description: | Mark Martinec discovered that Perl incorrectly clears the tainted flag on values returned by case conversion functions such as "lc". This may expose preexisting vulnerabilities in applications which use these functions while processing untrusted input. No such applications are known at this stage. Such applications will cease to work when this security update is applied because taint checks are designed to prevent such unsafe use of untrusted input data. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2265-1 CVE-2011-1487 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | perl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13932 | |||
Oval ID: | oval:org.mitre.oval:def:13932 | ||
Title: | USN-1129-1 -- perl vulnerabilities | ||
Description: | perl: Larry Wall�s Practical Extraction and Report Language An attacker could send crafted input to Perl and bypass intended restrictions. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1129-1 CVE-2010-1168 CVE-2010-1447 CVE-2010-2761 CVE-2010-4411 CVE-2010-4410 CVE-2011-1487 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 10.10 Ubuntu 6.06 Ubuntu 10.04 | Product(s): | perl |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19764 | |||
Oval ID: | oval:org.mitre.oval:def:19764 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-4410 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20547 | |||
Oval ID: | oval:org.mitre.oval:def:20547 | ||
Title: | VMware vSphere and vCOps updates to third party libraries | ||
Description: | The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-2761 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22359 | |||
Oval ID: | oval:org.mitre.oval:def:22359 | ||
Title: | RHSA-2010:0458: perl security update (Moderate) | ||
Description: | The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0458-02 CESA-2010:0458 CVE-2008-5302 CVE-2008-5303 CVE-2010-1168 CVE-2010-1447 | Version: | 55 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | perl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22753 | |||
Oval ID: | oval:org.mitre.oval:def:22753 | ||
Title: | ELSA-2010:0458: perl security update (Moderate) | ||
Description: | The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0458-02 CVE-2008-5302 CVE-2008-5303 CVE-2010-1168 CVE-2010-1447 | Version: | 21 |
Platform(s): | Oracle Linux 5 | Product(s): | perl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7320 | |||
Oval ID: | oval:org.mitre.oval:def:7320 | ||
Title: | VMware ESX,Service Console update for perl. | ||
Description: | The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1447 | Version: | 5 |
Platform(s): | VMWare ESX Server 3.5 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7424 | |||
Oval ID: | oval:org.mitre.oval:def:7424 | ||
Title: | VMware ESX,Service Console update for perl. | ||
Description: | The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1168 | Version: | 5 |
Platform(s): | VMWare ESX Server 3.5 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9807 | |||
Oval ID: | oval:org.mitre.oval:def:9807 | ||
Title: | The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods." | ||
Description: | The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1168 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-08-31 | Name : VMSA-2012-0013 VMware vSphere and vCOps updates to third party libraries. File : nvt/gb_VMSA-2012-0013.nasl |
2012-07-30 | Name : CentOS Update for perl CESA-2011:1797 centos4 x86_64 File : nvt/gb_CESA-2011_1797_perl_centos4_x86_64.nasl |
2012-07-30 | Name : CentOS Update for perl CESA-2011:1797 centos5 x86_64 File : nvt/gb_CESA-2011_1797_perl_centos5_x86_64.nasl |
2012-07-09 | Name : RedHat Update for perl RHSA-2011:0558-01 File : nvt/gb_RHSA-2011_0558-01_perl.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201111-09 (Safe) File : nvt/glsa_201111_09.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-22 (postgresql-server postgresql-base) File : nvt/glsa_201110_22.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-03 (bugzilla) File : nvt/glsa_201110_03.nasl |
2011-12-12 | Name : CentOS Update for perl CESA-2011:1797 centos4 i386 File : nvt/gb_CESA-2011_1797_perl_centos4_i386.nasl |
2011-12-12 | Name : CentOS Update for perl CESA-2011:1797 centos5 i386 File : nvt/gb_CESA-2011_1797_perl_centos5_i386.nasl |
2011-12-09 | Name : RedHat Update for perl RHSA-2011:1797-01 File : nvt/gb_RHSA-2011_1797-01_perl.nasl |
2011-08-09 | Name : CentOS Update for perl CESA-2010:0458 centos5 i386 File : nvt/gb_CESA-2010_0458_perl_centos5_i386.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2267-1 (perl) File : nvt/deb_2267_1.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2265-1 (perl) File : nvt/deb_2265_1.nasl |
2011-05-23 | Name : Mandriva Update for perl MDVSA-2011:091 (perl) File : nvt/gb_mandriva_MDVSA_2011_091.nasl |
2011-05-10 | Name : Ubuntu Update for perl USN-1129-1 File : nvt/gb_ubuntu_USN_1129_1.nasl |
2011-04-29 | Name : Fedora Update for perl FEDORA-2011-4918 File : nvt/gb_fedora_2011_4918_perl_fc13.nasl |
2011-04-22 | Name : Perl Laundering Security Bypass Vulnerability (Windows) File : nvt/gb_perl_sec_bypass_vuln.nasl |
2011-04-19 | Name : Fedora Update for perl FEDORA-2011-4610 File : nvt/gb_fedora_2011_4610_perl_fc14.nasl |
2011-03-05 | Name : FreeBSD Ports: bugzilla File : nvt/freebsd_bugzilla12.nasl |
2011-02-04 | Name : Fedora Update for perl-CGI FEDORA-2011-0654 File : nvt/gb_fedora_2011_0654_perl-CGI_fc13.nasl |
2011-02-04 | Name : Fedora Update for bugzilla FEDORA-2011-0741 File : nvt/gb_fedora_2011_0741_bugzilla_fc14.nasl |
2011-02-04 | Name : Fedora Update for perl-CGI FEDORA-2011-0640 File : nvt/gb_fedora_2011_0640_perl-CGI_fc14.nasl |
2011-01-31 | Name : Fedora Update for perl-CGI-Simple FEDORA-2011-0653 File : nvt/gb_fedora_2011_0653_perl-CGI-Simple_fc14.nasl |
2011-01-31 | Name : Fedora Update for perl-CGI-Simple FEDORA-2011-0631 File : nvt/gb_fedora_2011_0631_perl-CGI-Simple_fc13.nasl |
2011-01-21 | Name : Mandriva Update for perl-CGI MDVSA-2011:008 (perl-CGI) File : nvt/gb_mandriva_MDVSA_2011_008.nasl |
2010-12-28 | Name : Mandriva Update for perl-CGI-Simple MDVSA-2010:252 (perl-CGI-Simple) File : nvt/gb_mandriva_MDVSA_2010_252.nasl |
2010-12-23 | Name : Mandriva Update for perl-CGI-Simple MDVSA-2010:250 (perl-CGI-Simple) File : nvt/gb_mandriva_MDVSA_2010_250.nasl |
2010-12-02 | Name : Perl CGI.pm Header Values Newline Handling Unspecified Security Vulnerability File : nvt/gb_perl_CGI_45145.nasl |
2010-11-23 | Name : Mandriva Update for perl-CGI MDVSA-2010:237 (perl-CGI) File : nvt/gb_mandriva_MDVSA_2010_237.nasl |
2010-08-16 | Name : Fedora Update for perl FEDORA-2010-11340 File : nvt/gb_fedora_2010_11340_perl_fc12.nasl |
2010-08-06 | Name : Fedora Update for perl FEDORA-2010-11323 File : nvt/gb_fedora_2010_11323_perl_fc13.nasl |
2010-06-15 | Name : Mandriva Update for perl MDVSA-2010:116 (perl) File : nvt/gb_mandriva_MDVSA_2010_116.nasl |
2010-06-15 | Name : Mandriva Update for perl MDVSA-2010:115 (perl) File : nvt/gb_mandriva_MDVSA_2010_115.nasl |
2010-06-14 | Name : Perl Safe Module 'reval()' and 'rdo()' Restriction-Bypass Vulnerabilities File : nvt/gb_perl_safe_40302.nasl |
2010-06-14 | Name : Perl Safe Module 'reval()' and 'rdo()' Restriction-Bypass Vulnerabilities File : nvt/gb_perl_safe_40305.nasl |
2010-06-11 | Name : RedHat Update for perl RHSA-2010:0458-02 File : nvt/gb_RHSA-2010_0458-02_perl.nasl |
2010-06-11 | Name : RedHat Update for perl RHSA-2010:0457-01 File : nvt/gb_RHSA-2010_0457-01_perl.nasl |
2010-05-19 | Name : PostgreSQL Multiple Security Vulnerabilities File : nvt/gb_postgresql_40215.nasl |
2010-04-16 | Name : Mandriva Update for timezone MDVA-2010:116 (timezone) File : nvt/gb_mandriva_MDVA_2010_116.nasl |
2010-04-16 | Name : Mandriva Update for tkcvs MDVA-2010:115 (tkcvs) File : nvt/gb_mandriva_MDVA_2010_115.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
75047 | Perl Multiple Function Taint Protection Mechanism Bypass |
69589 | CGI.pm header() Function Newline Character Handling HTTP Header Injection CGI.pm contains a flaw related to the 'header()' function's handling of newline characters. This may allow a remote attacker to inject arbitrary HTTP headers in a response to the user. |
69588 | CGI.pm multipart_init() Function multipart/x-mixed-replace MIME Type HTTP Hea... CGI.pm contains a flaw related to the 'multipart_init()' function when handing a message with 'multipart/x-mixed-replace' MIME type. This may allow a remote attacker to inject arbitrary HTTP headers in a response to the user. |
65683 | Safe Module for Perl Automagic Methods Safe::reval / Safe::rdo Access Restric... |
64756 | PostgreSQL Safe Module PL / perl Procedure Restriction Weakness Arbitrary Per... |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2012-09-27 | IAVM : 2012-A-0153 - Multiple Vulnerabilities in VMware ESX 4.0 and ESXi 4.0 Severity : Category I - VMSKEY : V0033884 |
2012-09-13 | IAVM : 2012-A-0148 - Multiple Vulnerabilities in VMware ESXi 4.1 and ESX 4.1 Severity : Category I - VMSKEY : V0033794 |
2012-08-16 | IAVM : 2012-A-0136 - Multiple Vulnerabilities in Juniper Network Management Products Severity : Category I - VMSKEY : V0033662 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-08 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2010-0013_remote.nasl - Type : ACT_GATHER_INFO |
2016-02-29 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2012-0013_remote.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_perl-110506.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_perl-110112.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_perl-CGI-Simple-110107.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_perl-CGI-Simple-110127.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_perl-110506.nasl - Type : ACT_GATHER_INFO |
2013-11-29 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201311-17.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_2012_1.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-1797.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0458.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0457.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0429.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0428.nasl - Type : ACT_GATHER_INFO |
2012-08-31 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2012-0013.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20111208_perl_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110519_perl_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100607_perl_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100607_perl_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_perl-7507.nasl - Type : ACT_GATHER_INFO |
2011-12-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-1797.nasl - Type : ACT_GATHER_INFO |
2011-12-09 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-1797.nasl - Type : ACT_GATHER_INFO |
2011-11-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201111-09.nasl - Type : ACT_GATHER_INFO |
2011-10-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201110-22.nasl - Type : ACT_GATHER_INFO |
2011-10-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201110-03.nasl - Type : ACT_GATHER_INFO |
2011-07-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2267.nasl - Type : ACT_GATHER_INFO |
2011-06-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2265.nasl - Type : ACT_GATHER_INFO |
2011-06-13 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1129-1.nasl - Type : ACT_GATHER_INFO |
2011-05-20 | Name : The remote host is missing the patch for the advisory RHSA-2011-0558 File : redhat-RHSA-2011-0558.nasl - Type : ACT_GATHER_INFO |
2011-05-19 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-091.nasl - Type : ACT_GATHER_INFO |
2011-05-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_perl-110506.nasl - Type : ACT_GATHER_INFO |
2011-05-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_perl-110506.nasl - Type : ACT_GATHER_INFO |
2011-05-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_perl-7508.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_perl-CGI-Simple-110127.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_perl-CGI-Simple-110107.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_perl-110112.nasl - Type : ACT_GATHER_INFO |
2011-04-25 | Name : The remote Fedora host is missing a security update. File : fedora_2011-4918.nasl - Type : ACT_GATHER_INFO |
2011-04-18 | Name : The remote Fedora host is missing a security update. File : fedora_2011-4631.nasl - Type : ACT_GATHER_INFO |
2011-04-14 | Name : The remote Fedora host is missing a security update. File : fedora_2011-4610.nasl - Type : ACT_GATHER_INFO |
2011-02-03 | Name : The remote Fedora host is missing a security update. File : fedora_2011-0741.nasl - Type : ACT_GATHER_INFO |
2011-02-03 | Name : The remote Fedora host is missing a security update. File : fedora_2011-0755.nasl - Type : ACT_GATHER_INFO |
2011-02-01 | Name : The remote Fedora host is missing a security update. File : fedora_2011-0654.nasl - Type : ACT_GATHER_INFO |
2011-02-01 | Name : The remote Fedora host is missing a security update. File : fedora_2011-0640.nasl - Type : ACT_GATHER_INFO |
2011-01-31 | Name : The remote Fedora host is missing a security update. File : fedora_2011-0631.nasl - Type : ACT_GATHER_INFO |
2011-01-31 | Name : The remote Fedora host is missing a security update. File : fedora_2011-0653.nasl - Type : ACT_GATHER_INFO |
2011-01-28 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-008.nasl - Type : ACT_GATHER_INFO |
2011-01-26 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_c8c927e5289111e08f2600151735203a.nasl - Type : ACT_GATHER_INFO |
2011-01-21 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_perl-110112.nasl - Type : ACT_GATHER_INFO |
2011-01-21 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_perl-7316.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_perl-100730.nasl - Type : ACT_GATHER_INFO |
2010-11-16 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-237.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_perl-7108.nasl - Type : ACT_GATHER_INFO |
2010-09-02 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2010-0013.nasl - Type : ACT_GATHER_INFO |
2010-08-25 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12628.nasl - Type : ACT_GATHER_INFO |
2010-08-19 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_perl-100730.nasl - Type : ACT_GATHER_INFO |
2010-08-19 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_perl-100730.nasl - Type : ACT_GATHER_INFO |
2010-08-14 | Name : The remote Fedora host is missing a security update. File : fedora_2010-11340.nasl - Type : ACT_GATHER_INFO |
2010-08-03 | Name : The remote Fedora host is missing a security update. File : fedora_2010-11323.nasl - Type : ACT_GATHER_INFO |
2010-06-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-116.nasl - Type : ACT_GATHER_INFO |
2010-06-14 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-115.nasl - Type : ACT_GATHER_INFO |
2010-06-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0458.nasl - Type : ACT_GATHER_INFO |
2010-06-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0458.nasl - Type : ACT_GATHER_INFO |
2010-06-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0457.nasl - Type : ACT_GATHER_INFO |
2010-06-01 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0429.nasl - Type : ACT_GATHER_INFO |
2010-05-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2051.nasl - Type : ACT_GATHER_INFO |
2010-05-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-942-1.nasl - Type : ACT_GATHER_INFO |
2010-05-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0428.nasl - Type : ACT_GATHER_INFO |
2010-05-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0429.nasl - Type : ACT_GATHER_INFO |
2010-05-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0428.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:58:35 |
|