[USN-1129-1] Perl vulnerabilities

看板Bugtraq作者時間14年前 (2011/05/04 03:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
--=-iQvFlNE2Ih1JY5DUN3sQ Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Ubuntu Security Notice USN-1129-1 May 03, 2011 perl vulnerabilities =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS - Ubuntu 6.06 LTS Summary: An attacker could send crafted input to Perl and bypass intended restrictions. Software Description: - perl: Larry Wall's Practical Extraction and Report Language Details: It was discovered that the Safe.pm Perl module incorrectly handled Safe::reval and Safe::rdo access restrictions. An attacker could use this flaw to bypass intended restrictions and possibly execute arbitrary code. (CVE-2010-1168, CVE-2010-1447) It was discovered that the CGI.pm Perl module incorrectly handled certain MIME boundary strings. An attacker could use this flaw to inject arbitrary HTTP headers and perform HTTP response splitting and cross-site scripting attacks. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 10.04 LTS and 10.10. (CVE-2010-2761, CVE-2010-4411) It was discovered that the CGI.pm Perl module incorrectly handled newline characters. An attacker could use this flaw to inject arbitrary HTTP headers and perform HTTP response splitting and cross-site scripting attacks. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 10.04 LTS and 10.10. (CVE-2010-4410) It was discovered that the lc, lcfirst, uc, and ucfirst functions did not properly apply the taint attribute when processing tainted input. An attacker could use this flaw to bypass intended restrictions. This issue only affected Ubuntu 8.04 LTS, 10.04 LTS and 10.10. (CVE-2011-1487) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.04: perl 5.10.1-17ubuntu4.1 Ubuntu 10.10: perl 5.10.1-12ubuntu2.1 Ubuntu 10.04 LTS: perl 5.10.1-8ubuntu2.1 Ubuntu 8.04 LTS: perl 5.8.8-12ubuntu0.5 Ubuntu 6.06 LTS: perl 5.8.7-10ubuntu1.3 In general, a standard system update will make all the necessary changes. References: CVE-2010-1168, CVE-2010-1447, CVE-2010-2761, CVE-2010-4410, CVE-2010-4411, CVE-2011-1487 Package Information: https://launchpad.net/ubuntu/+source/perl/5.10.1-17ubuntu4.1 https://launchpad.net/ubuntu/+source/perl/5.10.1-12ubuntu2.1 https://launchpad.net/ubuntu/+source/perl/5.10.1-8ubuntu2.1 https://launchpad.net/ubuntu/+source/perl/5.8.8-12ubuntu0.5 https://launchpad.net/ubuntu/+source/perl/5.8.7-10ubuntu1.3 --=-iQvFlNE2Ih1JY5DUN3sQ Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAABCgAGBQJNwBYXAAoJEGVp2FWnRL6TankP/2ObZvMCFBJlYSwKHKq55+bR rgfOz0lQvVyCIJ3xmyu4wGJOvf8GiKykB7iXBwuZ778zp8xya7AdbiVzAtNuvsPh 189ZDvPwl++xnMZDa3IGhZ1neOBwKxDUuVb98f37bR8XP3W5c49S0tsiTuwFWWBn A63b2gy9jrxY3dMCaJxcnXHk1Yi5jewk5yXnN/Xg36o4fUpid4xSpK5L8ehQM5vc yxOZ5pPN8dJQayOZX77FV9+Ty8WmX0gmSieDlcdXaG2moyoX6375TbbcMfNCAA4+ wYyX1/H6nH7YStACepjf4YNyqntZnvxCxvf+rZoXfl4XDuig6ir4tjH6qOLDtJhf Y05hxb/fhWhdqYrUnMooCp8RoMT2ePc0kcSISBR2F4G1/nVn+cI5fE72pbvNSTfn RsVMSyl2tIo3pez1Fj15p8oh2ga9fo5KiPHxA+Jxe0DrGekhVqMq/sYl+zrveDSL tfz0TELIMN7c2omrxy0Eh/YBoo0lShN2RAThoihEZrx+q2ihyAsWR3V1rw+47QvW e2NynhLOcFxcs0kqqTDqqIyTUF7b1ITA7DWgElXVLB6jtMqlDKDcbrpgVTfPmdSC FJMJ+bCCsvAcopgm2Kvvfwe1J2HD1b+UperJyTyxYst2AvBFdvFcRGbqY+0s/Vg/ Ey3VbmAAmVWqs5S8l2fK =9g+z -----END PGP SIGNATURE----- --=-iQvFlNE2Ih1JY5DUN3sQ--
文章代碼(AID): #1Dm53k2m (Bugtraq)