Lucene search

K
gentooGentoo FoundationGLSA-201111-09
HistoryNov 20, 2011 - 12:00 a.m.

Perl Safe module: Arbitrary Perl code injection

2011-11-2000:00:00
Gentoo Foundation
security.gentoo.org
10

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.5%

Background

Safe is a Perl module to compile and execute code in restricted compartments.

Description

Unsafe code evaluation prevents the Safe module from properly restricting the code of implicitly called methods on implicitly blessed objects.

Impact

A remote attacker could entice a user to load a specially crafted Perl script, resulting in execution arbitrary Perl code outside of a restricted compartment.

Workaround

There is no known workaround at this time.

Resolution

All users of the standalone Perl Safe module should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=perl-core/Safe-2.27"

All users of the Safe module bundled with Perl should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=virtual/perl-Safe-2.27"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since July 18, 2010. It is likely that your system is already no longer affected by this issue.

OSVersionArchitecturePackageVersionFilename
Gentooanyallperl-core/safe< 2.27UNKNOWN
Gentooanyallvirtual/perl-safe< 2.27UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.5%