![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.53451 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 208-1 (perl, perl-5.004, perl-5.005) |
Summary: | The remote host is missing an update to perl, perl-5.004, perl-5.005;announced via advisory DSA 208-1. |
Description: | Summary: The remote host is missing an update to perl, perl-5.004, perl-5.005 announced via advisory DSA 208-1. Vulnerability Insight: A security hole has been discovered in Safe.pm which is used in all versions of Perl. The Safe extension module allows the creation of compartments in which perl code can be evaluated in a new namespace and the code evaluated in the compartment cannot refer to variables outside this namespace. However, when a Safe compartment has already been used, there's no guarantee that it is Safe any longer, because there's a way for code to be executed within the Safe compartment to alter its operation mask. Thus, programs that use a Safe compartment only once aren't affected by this bug. This problem has been fixed in version 5.6.1-8.2 for the current stable distribution (woody), in version 5.004.05-6.2 and 5.005.03-7.2 for the old stable distribution (potato) and in version 5.8.0-14 for the unstable distribution (sid). Solution: We recommend that you upgrade your Perl packages. CVSS Score: 4.6 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2002-1323 BugTraq ID: 6111 http://www.securityfocus.com/bid/6111 Bugtraq: 20021216 [OpenPKG-SA-2002.014] OpenPKG Security Advisory (perl) (Google Search) http://marc.info/?l=bugtraq&m=104005919814869&w=2 Bugtraq: 20021219 TSLSA-2002-0087 - perl (Google Search) http://marc.info/?l=bugtraq&m=104033126305252&w=2 Bugtraq: 20021220 GLSA: perl (Google Search) http://marc.info/?l=bugtraq&m=104040175522502&w=2 Caldera Security Advisory: CSSA-2004-007.0 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt Debian Security Information: DSA-208 (Google Search) http://www.debian.org/security/2002/dsa-208 http://www.osvdb.org/2183 http://www.osvdb.org/3814 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160 http://www.redhat.com/support/errata/RHSA-2003-256.html http://www.redhat.com/support/errata/RHSA-2003-257.html SCO Security Bulletin: SCOSA-2004.1 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt SGI Security Advisory: 20030606-01-A ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html http://www.iss.net/security_center/static/10574.php |
Copyright | Copyright (C) 2008 E-Soft Inc. |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |