4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
51.6%
The remote host is missing the patch for the advisory SUSE-SA:2005:071 (perl).
Integer overflows in the format string functionality in Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap.
This requires the attacker to be able to supply format strings to the application, which unfortunately is true for some web applications.
This issue is tracked by the Mitre CVE ID CVE-2005-3962.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2005:071
#
if ( ! defined_func("bn_random") ) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if(description)
{
script_id(20370);
script_version("1.9");
name["english"] = "SUSE-SA:2005:071: perl";
script_name(english:name["english"]);
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SUSE-SA:2005:071 (perl).
Integer overflows in the format string functionality in Perl allows
attackers to overwrite arbitrary memory and possibly execute arbitrary
code via format string specifiers with large values, which causes an
integer wrap.
This requires the attacker to be able to supply format strings to the
application, which unfortunately is true for some web applications.
This issue is tracked by the Mitre CVE ID CVE-2005-3962." );
script_set_attribute(attribute:"solution", value:
"http://www.suse.de/security/advisories/2005_71_perl.html" );
script_set_attribute(attribute:"risk_factor", value:"High" );
script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/30");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_end_attributes();
summary["english"] = "Check for the version of the perl package";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
family["english"] = "SuSE Local Security Checks";
script_family(english:family["english"]);
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/SuSE/rpm-list");
exit(0);
}
include("rpm.inc");
if ( rpm_check( reference:"perl-5.8.7-5.3", release:"SUSE10.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"perl-5.8.1-133", release:"SUSE9.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"perl-5.8.3-32.9", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"perl-5.8.5-3.5", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"perl-5.8.6-5.3", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}