ID OPENVAS:703628 Type openvas Reporter Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net Modified 2017-07-07T00:00:00
Description
Multiple vulnerabilities were discovered in
the implementation of the Perl programming language. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2016-1238
John Lightsey and Todd Rinaldo reported that the opportunistic
loading of optional modules can make many programs unintentionally
load code from the current working directory (which might be changed
to another directory without the user realising) and potentially
leading to privilege escalation, as demonstrated in Debian with
certain combinations of installed packages.
The problem relates to Perl loading modules from the includes
directory array (
# OpenVAS Vulnerability Test
# $Id: deb_3628.nasl 3784 2016-08-02 08:07:52Z antu123 $
# Auto-generated from advisory DSA 3628-1 using nvtgen 1.0
# Script version: 1.0
#
# Author:
# Greenbone Networks
#
# Copyright:
# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
if(description)
{
script_id(703628);
script_version("$Revision: 6608 $");
script_cve_id("CVE-2016-1238", "CVE-2016-6185");
script_name("Debian Security Advisory DSA 3628-1 (perl - security update)");
script_tag(name: "last_modification", value: "$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2016-08-02 10:56:30 +0530 (Tue, 02 Aug 2016)");
script_tag(name:"cvss_base", value:"7.2");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name: "solution_type", value: "VendorFix");
script_tag(name: "qod_type", value: "package");
script_xref(name: "URL", value: "http://www.debian.org/security/2016/dsa-3628.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name: "affected", value: "perl on Debian Linux");
script_tag(name: "insight", value: "Perl is a highly capable, feature-rich
programming language with over 20 years of development. Perl 5 runs on over 100
platforms from portables to mainframes. Perl is suitable for both rapid prototyping
and large scale development projects.");
script_tag(name: "solution", value: "For the stable distribution (jessie),
these problems have been fixed in version 5.20.2-3+deb8u6. Additionally this update
includes the following updated packages to address optional module loading
vulnerabilities related to CVE-2016-1238
,
or to address build failures which occur when '.' is removed from @INC:
cdbs 0.4.130+deb8u1debhelper 9.20150101+deb8u2devscripts 2.15.3+deb8u12exim4
4.84.2-2+deb8u12libintl-perl 1.23-1+deb8u12libmime-charset-perl
1.011.1-1+deb8u22libmime-encwords-perl 1.014.3-1+deb8u12libmodule-build-perl
0.421000-2+deb8u12libnet-dns-perl 0.81-2+deb8u12libsys-syslog-perl
0.33-1+deb8u12libunicode-linebreak-perl 0.0.20140601-2+deb8u22
We recommend that you upgrade your perl packages.");
script_tag(name: "summary", value: "Multiple vulnerabilities were discovered in
the implementation of the Perl programming language. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2016-1238
John Lightsey and Todd Rinaldo reported that the opportunistic
loading of optional modules can make many programs unintentionally
load code from the current working directory (which might be changed
to another directory without the user realising) and potentially
leading to privilege escalation, as demonstrated in Debian with
certain combinations of installed packages.
The problem relates to Perl loading modules from the includes
directory array ('@INC') in which the last element is the current
directory ('.'). That means that, when perl
wants to load a module
(during first compilation or during lazy loading of a module in run
time), perl will look for the module in the current directory at the
end, since '.' is the last include directory in its array of include
directories to seek. The issue is with requiring libraries that are
in '.' but are not otherwise installed.
With this update several modules which are known to be vulnerable
are updated to not load modules from current directory.
Additionally the update allows configurable removal of '.' from @INC
in /etc/perl/sitecustomize.pl for a transitional period. It is
recommended to enable this setting if the possible breakage for a
specific site has been evaluated. Problems in packages provided in
Debian resulting from the switch to the removal of '.' from @INC
should be reported to the Perl maintainers at
perl@packages.debian.org .
It is planned to switch to the default removal of '.' in @INC in a
subsequent update to perl via a point release if possible, and in
any case for the upcoming stable release Debian 9 (stretch).
CVE-2016-6185
It was discovered that XSLoader, a core module from Perl to
dynamically load C libraries into Perl code, could load shared
library from incorrect location. XSLoader uses caller() information
to locate the .so file to load. This can be incorrect if
XSLoader::load() is called in a string eval. An attacker can take
advantage of this flaw to execute arbitrary code.");
script_tag(name: "vuldetect", value: "This check tests the installed software
version using the apt package manager.");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"libperl-dev", ver:"5.20.2-3+deb8u6", rls_regex:"DEB8.[0-9]+")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"libperl5.20", ver:"5.20.2-3+deb8u6", rls_regex:"DEB8.[0-9]+")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"perl", ver:"5.20.2-3+deb8u6", rls_regex:"DEB8.[0-9]+")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"perl-base", ver:"5.20.2-3+deb8u6", rls_regex:"DEB8.[0-9]+")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"perl-debug", ver:"5.20.2-3+deb8u6", rls_regex:"DEB8.[0-9]+")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"perl-doc", ver:"5.20.2-3+deb8u6", rls_regex:"DEB8.[0-9]+")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"perl-modules", ver:"5.20.2-3+deb8u6", rls_regex:"DEB8.[0-9]+")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"id": "OPENVAS:703628", "type": "openvas", "bulletinFamily": "scanner", "title": "Debian Security Advisory DSA 3628-1 (perl - security update)", "description": "Multiple vulnerabilities were discovered in\nthe implementation of the Perl programming language. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2016-1238 \nJohn Lightsey and Todd Rinaldo reported that the opportunistic\nloading of optional modules can make many programs unintentionally\nload code from the current working directory (which might be changed\nto another directory without the user realising) and potentially\nleading to privilege escalation, as demonstrated in Debian with\ncertain combinations of installed packages.\n\nThe problem relates to Perl loading modules from the includes\ndirectory array (", "published": "2016-08-02T00:00:00", "modified": "2017-07-07T00:00:00", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=703628", "reporter": "Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net", "references": ["http://www.debian.org/security/2016/dsa-3628.html"], "cvelist": ["CVE-2016-6185", "CVE-2016-1238"], "lastseen": "2017-07-24T12:54:22", "viewCount": 0, "enchantments": {"score": {"value": 7.3, "vector": "NONE", "modified": "2017-07-24T12:54:22", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-6185", "CVE-2016-1238"]}, {"type": "f5", "idList": ["F5:K39909763"]}, {"type": "nessus", "idList": ["OPENSUSE-2016-1086.NASL", "DEBIAN_DLA-565.NASL", "SUSE_SU-2016-2263-1.NASL", "SUSE_SU-2016-2246-1.NASL", "DEBIAN_DSA-3628.NASL", "FEDORA_2016-485DFF6060.NASL", "FEDORA_2016-742BDE2BE7.NASL", "EULEROS_SA-2020-1476.NASL", "GENTOO_GLSA-201701-75.NASL", "EULEROS_SA-2020-1122.NASL"]}, {"type": "debian", "idList": ["DEBIAN:DLA-584-1:EF94A", "DEBIAN:DLA-565-1:83AD7", "DEBIAN:DSA-3628-1:D8F67", "DEBIAN:DLA-1578-1:2E319"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562311220201476", "OPENVAS:1361412562310808846", "OPENVAS:1361412562311220201122", "OPENVAS:1361412562310808892", "OPENVAS:1361412562310703628", "OPENVAS:1361412562310809146", "OPENVAS:1361412562310809819", "OPENVAS:1361412562310809818", "OPENVAS:1361412562310808895", "OPENVAS:1361412562310808760"]}, {"type": "gentoo", "idList": ["GLSA-201701-75", "GLSA-201812-07"]}, {"type": "freebsd", "idList": ["3E08047F-5A6C-11E6-A6C3-14DAE9D210B8", "72BFBB09-5A6A-11E6-A6C3-14DAE9D210B8", "613193A0-C1B4-11E8-AE2D-54E1AD3D6335"]}, {"type": "fedora", "idList": ["FEDORA:402146014575", "FEDORA:109E46048D5B", "FEDORA:226986090E6E", "FEDORA:0D7936087A9D", "FEDORA:D448D607798F", "FEDORA:C1D2D6067316", "FEDORA:19C0160129CA", "FEDORA:2E7CF6087563", "FEDORA:6A601603125C"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:0297-1", "SUSE-SU-2017:2699-1", "OPENSUSE-SU-2019:1831-1", "SUSE-SU-2017:2700-1"]}, {"type": "ubuntu", "idList": ["USN-3625-2", "USN-3625-1"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:FA7BC5305B374333F5A5DADEC36DEA52"]}], "modified": "2017-07-24T12:54:22", "rev": 2}, "vulnersScore": 7.3}, "pluginID": "703628", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3628.nasl 3784 2016-08-02 08:07:52Z antu123 $\n# Auto-generated from advisory DSA 3628-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703628);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-1238\", \"CVE-2016-6185\");\n script_name(\"Debian Security Advisory DSA 3628-1 (perl - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-02 10:56:30 +0530 (Tue, 02 Aug 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3628.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"perl on Debian Linux\");\n script_tag(name: \"insight\", value: \"Perl is a highly capable, feature-rich\nprogramming language with over 20 years of development. Perl 5 runs on over 100\nplatforms from portables to mainframes. Perl is suitable for both rapid prototyping\nand large scale development projects.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie),\nthese problems have been fixed in version 5.20.2-3+deb8u6. Additionally this update\nincludes the following updated packages to address optional module loading\nvulnerabilities related to CVE-2016-1238 \n,\nor to address build failures which occur when '.' is removed from @INC:\n\ncdbs 0.4.130+deb8u1debhelper 9.20150101+deb8u2devscripts 2.15.3+deb8u12exim4\n4.84.2-2+deb8u12libintl-perl 1.23-1+deb8u12libmime-charset-perl\n1.011.1-1+deb8u22libmime-encwords-perl 1.014.3-1+deb8u12libmodule-build-perl\n0.421000-2+deb8u12libnet-dns-perl 0.81-2+deb8u12libsys-syslog-perl\n0.33-1+deb8u12libunicode-linebreak-perl 0.0.20140601-2+deb8u22 \nWe recommend that you upgrade your perl packages.\");\n script_tag(name: \"summary\", value: \"Multiple vulnerabilities were discovered in\nthe implementation of the Perl programming language. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2016-1238 \nJohn Lightsey and Todd Rinaldo reported that the opportunistic\nloading of optional modules can make many programs unintentionally\nload code from the current working directory (which might be changed\nto another directory without the user realising) and potentially\nleading to privilege escalation, as demonstrated in Debian with\ncertain combinations of installed packages.\n\nThe problem relates to Perl loading modules from the includes\ndirectory array ('@INC') in which the last element is the current\ndirectory ('.'). That means that, when perl \nwants to load a module\n(during first compilation or during lazy loading of a module in run\ntime), perl will look for the module in the current directory at the\nend, since '.' is the last include directory in its array of include\ndirectories to seek. The issue is with requiring libraries that are\nin '.' but are not otherwise installed.\n\nWith this update several modules which are known to be vulnerable\nare updated to not load modules from current directory.\n\nAdditionally the update allows configurable removal of '.' from @INC\nin /etc/perl/sitecustomize.pl for a transitional period. It is\nrecommended to enable this setting if the possible breakage for a\nspecific site has been evaluated. Problems in packages provided in\nDebian resulting from the switch to the removal of '.' from @INC\nshould be reported to the Perl maintainers at\nperl@packages.debian.org .\n\nIt is planned to switch to the default removal of '.' in @INC in a\nsubsequent update to perl via a point release if possible, and in\nany case for the upcoming stable release Debian 9 (stretch).\n\nCVE-2016-6185 \nIt was discovered that XSLoader, a core module from Perl to\ndynamically load C libraries into Perl code, could load shared\nlibrary from incorrect location. XSLoader uses caller() information\nto locate the .so file to load. This can be incorrect if\nXSLoader::load() is called in a string eval. An attacker can take\nadvantage of this flaw to execute arbitrary code.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libperl-dev\", ver:\"5.20.2-3+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libperl5.20\", ver:\"5.20.2-3+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"perl\", ver:\"5.20.2-3+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"perl-base\", ver:\"5.20.2-3+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"perl-debug\", ver:\"5.20.2-3+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"perl-doc\", ver:\"5.20.2-3+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"perl-modules\", ver:\"5.20.2-3+deb8u6\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "naslFamily": "Debian Local Security Checks"}
{"cve": [{"lastseen": "2021-02-02T06:28:09", "description": "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", "edition": 7, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2016-08-02T14:59:00", "title": "CVE-2016-6185", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6185"], "modified": "2020-09-10T13:20:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:17.10", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:fedoraproject:fedora:24", "cpe:/o:oracle:solaris:10", "cpe:/o:fedoraproject:fedora:22", "cpe:/o:fedoraproject:fedora:23", "cpe:/o:oracle:solaris:11.3", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "CVE-2016-6185", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6185", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"]}, {"lastseen": "2021-02-02T06:28:02", "description": "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", "edition": 5, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-08-02T14:59:00", "title": "CVE-2016-1238", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-1238"], "modified": "2018-12-16T11:29:00", "cpe": ["cpe:/a:perl:perl:5.17.3", "cpe:/a:perl:perl:5.003_19", "cpe:/a:perl:perl:5.19.3", "cpe:/a:perl:perl:5.003_01", "cpe:/a:perl:perl:5.19.9", "cpe:/a:perl:perl:5.19.8", "cpe:/a:perl:perl:5.003_21", "cpe:/a:perl:perl:5.003_91", "cpe:/a:perl:perl:5.7.3", "cpe:/a:perl:perl:5.17.9", "cpe:/a:perl:perl:5.19.7", "cpe:/a:perl:perl:5.003_13", "cpe:/a:perl:perl:1.0.15", "cpe:/a:perl:perl:5.003_08", "cpe:/a:perl:perl:5.18.1", "cpe:/a:perl:perl:5.000", "cpe:/a:perl:perl:5.17.0", "cpe:/a:perl:perl:5.003_97g", "cpe:/a:perl:perl:5.13.0", "cpe:/a:perl:perl:5.003_27", "cpe:/a:perl:perl:5.003_97c", "cpe:/a:perl:perl:5.003_97b", "cpe:/a:perl:perl:5.15.9", "cpe:/a:perl:perl:5.16.3.", "cpe:/a:perl:perl:5.21.11", "cpe:/a:perl:perl:5.22.1", "cpe:/a:perl:perl:5.003_97a", "cpe:/a:perl:perl:5.003_14", "cpe:/a:perl:perl:5.004_04", "cpe:/a:perl:perl:5.24.1", "cpe:/a:perl:perl:5.003_15", "cpe:/a:perl:perl:5.17.2", "cpe:/a:perl:perl:5.003_96", "cpe:/a:perl:perl:5.14.1", "cpe:/a:perl:perl:5.12.0", "cpe:/a:perl:perl:5.19.2", "cpe:/a:perl:perl:5.12.5", "cpe:/a:perl:perl:5.8.5", "cpe:/a:perl:perl:1.0.16", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:perl:perl:5.11.2", "cpe:/a:perl:perl:5.13.5", "cpe:/a:perl:perl:5.003_97i", "cpe:/a:perl:perl:5.003_11", "cpe:/a:perl:perl:5.17.1", "cpe:/a:perl:perl:5.003_24", "cpe:/a:perl:perl:5.21.7", "cpe:/a:perl:perl:5.12.3", "cpe:/a:perl:perl:5.13.3", "cpe:/a:perl:perl:5.15.5", "cpe:/a:perl:perl:5.11.1", "cpe:/a:perl:perl:5.21.9", "cpe:/a:perl:perl:5.15.7", "cpe:/a:perl:perl:5.8.3", "cpe:/a:perl:perl:5.9.3", "cpe:/a:perl:perl:5.003_28", "cpe:/a:perl:perl:5.14.4", "cpe:/a:perl:perl:5.16.1", "cpe:/a:perl:perl:5.003_22", "cpe:/a:perl:perl:5.8.1", "cpe:/a:perl:perl:5.21.3", "cpe:/a:perl:perl:5.15.1", "cpe:/a:perl:perl:5.6", "cpe:/a:perl:perl:5.20.2", "cpe:/a:perl:perl:5.19.11", "cpe:/a:perl:perl:5.13.6", "cpe:/a:perl:perl:5.002", "cpe:/a:perl:perl:5.11.4", "cpe:/a:perl:perl:5.19.10", "cpe:/a:perl:perl:5.8.7", "cpe:/a:perl:perl:5.9.1", "cpe:/a:perl:perl:5.13.9", "cpe:/a:perl:perl:5.003_17", "cpe:/a:perl:perl:5.17.4", "cpe:/a:perl:perl:5.19.4", "cpe:/a:perl:perl:5.003_93", "cpe:/a:perl:perl:5.21.2", "cpe:/a:perl:perl:5.6.2", "cpe:/a:perl:perl:5.14.2", "cpe:/a:perl:perl:5.004", "cpe:/a:perl:perl:5.9.4", "cpe:/a:perl:perl:5.003_25", "cpe:/a:perl:perl:5.9.0", "cpe:/a:perl:perl:5.003_20", "cpe:/a:perl:perl:5.13.4", "cpe:/a:perl:perl:5.20.3", "cpe:/a:perl:perl:5.17.7.0", "cpe:/a:perl:perl:5.15.0", "cpe:/a:perl:perl:5.13.7", "cpe:/a:perl:perl:5.22.2", "cpe:/a:perl:perl:5.6.0", "cpe:/a:perl:perl:5.15.8", "cpe:/a:perl:perl:5.21.10", "cpe:/a:perl:perl:5.19.6", "cpe:/a:perl:perl:5.003_04", "cpe:/a:perl:perl:5.003_90", "cpe:/a:perl:perl:5.003_95", "cpe:/a:perl:perl:5.18.4", "cpe:/a:perl:perl:5.003_97h", "cpe:/a:perl:perl:5.003_12", "cpe:/a:perl:perl:5.003_99a", "cpe:/a:perl:perl:5.9.5", "cpe:/a:perl:perl:5.003_10", "cpe:/a:perl:perl:5.004_03", "cpe:/a:perl:perl:5.18.3", "cpe:/a:perl:perl:5.003_94", "cpe:/a:perl:perl:5.10.0", "cpe:/a:perl:perl:5.003_92", "cpe:/a:perl:perl:5.17.10", "cpe:/a:perl:perl:5.12.1", "cpe:/a:perl:perl:5.22.3", "cpe:/a:perl:perl:5.004_02", "cpe:/a:perl:perl:5.003_18", "cpe:/a:perl:perl:5.005_03", "cpe:/a:perl:perl:5.15.3", "cpe:/a:perl:perl:5.001n", "cpe:/a:perl:perl:5.001", "cpe:/a:perl:perl:5.13.11", "cpe:/a:perl:perl:5.17.11", "cpe:/a:perl:perl:5.004_05", "cpe:/a:perl:perl:5.8", "cpe:/a:perl:perl:5.11.5", "cpe:/a:perl:perl:5.003_09", "cpe:/a:perl:perl:5.21.6", "cpe:/a:perl:perl:5.21.1", "cpe:/a:perl:perl:5.003", "cpe:/a:perl:perl:5.20.0", "cpe:/a:perl:perl:5.003_23", "cpe:/a:perl:perl:5.22.0", "cpe:/a:perl:perl:5.17.8", "cpe:/a:perl:perl:5.15.4", "cpe:/a:perl:perl:5.003_03", "cpe:/a:perl:perl:5.003_02", "cpe:/a:perl:perl:5.003_16", "cpe:/a:perl:perl:5.8.0", "cpe:/a:perl:perl:5.21.8", "cpe:/a:perl:perl:5.003_98", "cpe:/a:perl:perl:5.002_01", "cpe:/a:perl:perl:5.003_97j", "cpe:/a:perl:perl:5.005_01", "cpe:/a:perl:perl:5.10", "cpe:/a:perl:perl:5.003_99", "cpe:/a:perl:perl:5.8.8", "cpe:/a:perl:perl:5.000o", "cpe:/a:perl:perl:5.005_04", "cpe:/a:perl:perl:5.9.2", "cpe:/a:perl:perl:5.18.2", "cpe:/a:perl:perl:5.13.1", "cpe:/a:perl:perl:5.19.1", "cpe:/a:perl:perl:5.8.9", "cpe:/a:perl:perl:5.16.0", "cpe:/a:perl:perl:5.003_26", "cpe:/a:perl:perl:5.18.0", "cpe:/a:perl:perl:5.12.4", "cpe:/a:perl:perl:5.8.6", "cpe:/a:perl:perl:5.20.1", "cpe:/a:perl:perl:5.16.2", "cpe:/a:perl:perl:5.005", "cpe:/a:perl:perl:5.24.0", "cpe:/a:perl:perl:5.003_97f", "cpe:/a:perl:perl:5.003_97e", "cpe:/a:perl:perl:5.10.1", "cpe:/a:perl:perl:5.12.2", "cpe:/a:perl:perl:5.16.3", "cpe:/a:perl:perl:5.14.3", "cpe:/a:perl:perl:5.8.2", "cpe:/a:perl:perl:5.6.1", "cpe:/a:perl:perl:5.8.4", "cpe:/a:perl:perl:5.21.4", "cpe:/a:perl:perl:5.005_02", "cpe:/a:perl:perl:5.19.0", "cpe:/a:perl:perl:5.003_97d", "cpe:/a:perl:perl:5.17.5", "cpe:/a:perl:perl:5.13.8", "cpe:/a:perl:perl:5.15.6", "cpe:/a:perl:perl:5.003_07", "cpe:/a:perl:perl:5.11.3", "cpe:/a:perl:perl:5.17.6", "cpe:/a:perl:perl:5.19.5", "cpe:/a:perl:perl:5.13.10", "cpe:/a:perl:perl:5.004_01", "cpe:/a:perl:perl:5.003_97", "cpe:/a:perl:perl:5.21.0", "cpe:/a:perl:perl:5.15.2", "cpe:/a:perl:perl:5.11.0", "cpe:/a:perl:perl:5.17.7", "cpe:/a:perl:perl:5.003_05", "cpe:/a:perl:perl:5.21.5", "cpe:/a:perl:perl:5.13.2", "cpe:/a:perl:perl:5.14.0"], "id": "CVE-2016-1238", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1238", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:perl:perl:5.18.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97i:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.004_01:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_05:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.24.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_02:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.005_04:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_20:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_96:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_99a:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97h:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.004_04:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_27:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.24.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.2:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_91:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.000o:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97f:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.005_03:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.3.:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.004_03:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_04:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_95:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97a:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.24.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.2:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_09:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_14:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_01:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_93:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.004:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_98:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.24.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.005:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_25:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_08:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_07:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_03:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_28:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97e:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_99:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.000:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.24.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_13:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_94:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_15:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc0:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_16:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_24:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97b:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_12:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97c:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_21:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97j:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.005_01:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_90:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_23:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.001n:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.001:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_18:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_26:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97d:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_17:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.18.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.005_02:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.24.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.002_01:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97g:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_97:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.002:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.21.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.15.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_92:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_19:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.004_05:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.004_02:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.22.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.17.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.003_22:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2019-05-08T22:21:20", "bulletinFamily": "software", "cvelist": ["CVE-2016-1238"], "description": "\nF5 Product Development has assigned CPF-24621 (Traffix) to this vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct | Versions known to be vulnerable | Versions known to be not vulnerable | Severity | CVSSv3 score2 | Vulnerable component or feature \n---|---|---|---|---|--- \nBIG-IP LTM | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 \n11.2.1 | Not vulnerable1 | None | None \nBIG-IP AAM | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 | Not vulnerable1 | None | None \nBIG-IP AFM | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 | Not vulnerable1 | None | None \nBIG-IP Analytics | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 \n11.2.1 | Not vulnerable1 | None | None \nBIG-IP APM | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 \n11.2.1 | Not vulnerable1 | None | None \nBIG-IP ASM | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 \n11.2.1 | Not vulnerable1 | None | None \nBIG-IP DNS | None | 13.0.0 \n12.0.0 - 12.1.2 | Not vulnerable1 | None | None \nBIG-IP Edge Gateway | None | 11.2.1 | Not vulnerable1 | None | None \nBIG-IP GTM | None | 11.5.1 - 11.6.1 \n11.2.1 | Not vulnerable1 | None | None \nBIG-IP Link Controller | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 \n11.2.1 | Not vulnerable1 | None | None \nBIG-IP PEM | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.5.1 - 11.6.1 | Not vulnerable1 | None | None \nBIG-IP WebAccelerator | None | 11.2.1 | Not vulnerable1 | None | None \nF5 WebSafe | None | 13.0.0 \n12.0.0 - 12.1.2 \n11.6.1 | Not vulnerable1 | None | None \nARX | None | 6.2.0 - 6.4.0 | Not vulnerable1 | None | None \nEnterprise Manager | None | 3.1.1 | Not vulnerable1 | None | None \nBIG-IQ Cloud | None | 4.4.0 - 4.5.0 | Not vulnerable1 | None | None \nBIG-IQ Device | None | 4.4.0 - 4.5.0 | Not vulnerable1 | None | None \nBIG-IQ Security | None | 4.4.0 - 4.5.0 | Not vulnerable1 | None | None \nBIG-IQ ADC | None | 4.5.0 | Not vulnerable1 | None | None \nBIG-IQ Centralized Management | None | 5.0.0 - 5.3.0 \n4.6.0 | Not vulnerable1 | None | None \nBIG-IQ Cloud and Orchestration | None | 1.0.0 | Not vulnerable1 | None | None \nF5 iWorkflow | None | 2.0.0 - 2.3.0 | Not vulnerable1 | None | None \nLineRate | None | 2.5.0 - 2.6.2 | Not vulnerable1 | None | None \nTraffix SDC | 5.0.0 - 5.1.0 \n4.0.0 - 4.4.0 | None | Medium | [6.7](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H>) | Perl \n \n1 The specified products contain the affected code. However, F5 identifies the vulnerability status as Not vulnerable because the attacker cannot exploit the code in default, standard, or recommended configurations.\n\n2The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Versions known to be not vulnerable** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n", "edition": 1, "modified": "2017-10-27T20:23:00", "published": "2017-10-25T20:46:00", "id": "F5:K39909763", "href": "https://support.f5.com/csp/article/K39909763", "title": "Perl vulnerability CVE-2016-1238", "type": "f5", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-12T09:43:54", "description": "Multiple vulnerabilities were discovered in the implementation of the\nPerl programming language. The Common Vulnerabilities and Exposures\nproject identifies the following problems :\n\nCVE-2016-1238\n\nJohn Lightsey and Todd Rinaldo reported that the opportunistic loading\nof optional modules can make many programs unintentionally load code\nfrom the current working directory (which might be changed to another\ndirectory without the user realising) and potentially leading to\nprivilege escalation, as demonstrated in Debian with certain\ncombinations of installed packages.\n\nThe problem relates to Perl loading modules from the\nincludes directory array ('@INC') in which the last element\nis the current directory ('.'). That means that, when 'perl'\nwants to load a module (during first compilation or during\nlazy loading of a module in run- time), perl will look for\nthe module in the current directory at the end, since '.' is\nthe last include directory in its array of include\ndirectories to seek. The issue is with requiring libraries\nthat are in '.' but are not otherwise installed.\n\nWith this update several modules which are known to be\nvulnerable are updated to not load modules from current\ndirectory.\n\nAdditionally the update allows configurable removal of '.'\nfrom @INC in /etc/perl/sitecustomize.pl for a transitional\nperiod. It is recommended to enable this setting if the\npossible breakage for a specific site has been evaluated.\nProblems in packages provided in Debian resulting from the\nswitch to the removal of '.' from @INC should be reported to\nthe Perl maintainers at perl@packages.debian.org .\n\nCVE-2016-6185\n\nIt was discovered that XSLoader, a core module from Perl to\ndynamically load C libraries into Perl code, could load shared library\nfrom incorrect location. XSLoader uses caller() information to locate\nthe .so file to load. This can be incorrect if XSLoader::load() is\ncalled in a string eval. An attacker can take advantage of this flaw\nto execute arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n5.14.2-21+deb7u4.\n\nWe recommend that you upgrade your perl packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "edition": 17, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-07-29T00:00:00", "title": "Debian DLA-565-1 : perl security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238"], "modified": "2016-07-29T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libperl-dev", "p-cpe:/a:debian:debian_linux:perl-modules", "p-cpe:/a:debian:debian_linux:perl-doc", "p-cpe:/a:debian:debian_linux:libcgi-fast-perl", "p-cpe:/a:debian:debian_linux:libperl5.14", "p-cpe:/a:debian:debian_linux:perl-debug", "p-cpe:/a:debian:debian_linux:perl-base", "p-cpe:/a:debian:debian_linux:perl", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DLA-565.NASL", "href": "https://www.tenable.com/plugins/nessus/92613", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-565-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92613);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-1238\", \"CVE-2016-6185\");\n\n script_name(english:\"Debian DLA-565-1 : perl security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the implementation of the\nPerl programming language. The Common Vulnerabilities and Exposures\nproject identifies the following problems :\n\nCVE-2016-1238\n\nJohn Lightsey and Todd Rinaldo reported that the opportunistic loading\nof optional modules can make many programs unintentionally load code\nfrom the current working directory (which might be changed to another\ndirectory without the user realising) and potentially leading to\nprivilege escalation, as demonstrated in Debian with certain\ncombinations of installed packages.\n\nThe problem relates to Perl loading modules from the\nincludes directory array ('@INC') in which the last element\nis the current directory ('.'). That means that, when 'perl'\nwants to load a module (during first compilation or during\nlazy loading of a module in run- time), perl will look for\nthe module in the current directory at the end, since '.' is\nthe last include directory in its array of include\ndirectories to seek. The issue is with requiring libraries\nthat are in '.' but are not otherwise installed.\n\nWith this update several modules which are known to be\nvulnerable are updated to not load modules from current\ndirectory.\n\nAdditionally the update allows configurable removal of '.'\nfrom @INC in /etc/perl/sitecustomize.pl for a transitional\nperiod. It is recommended to enable this setting if the\npossible breakage for a specific site has been evaluated.\nProblems in packages provided in Debian resulting from the\nswitch to the removal of '.' from @INC should be reported to\nthe Perl maintainers at perl@packages.debian.org .\n\nCVE-2016-6185\n\nIt was discovered that XSLoader, a core module from Perl to\ndynamically load C libraries into Perl code, could load shared library\nfrom incorrect location. XSLoader uses caller() information to locate\nthe .so file to load. This can be incorrect if XSLoader::load() is\ncalled in a string eval. An attacker can take advantage of this flaw\nto execute arbitrary code.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n5.14.2-21+deb7u4.\n\nWe recommend that you upgrade your perl packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2016/07/msg00027.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/perl\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcgi-fast-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libperl-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libperl5.14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perl-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perl-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perl-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perl-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libcgi-fast-perl\", reference:\"5.14.2-21+deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libperl-dev\", reference:\"5.14.2-21+deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libperl5.14\", reference:\"5.14.2-21+deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"perl\", reference:\"5.14.2-21+deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"perl-base\", reference:\"5.14.2-21+deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"perl-debug\", reference:\"5.14.2-21+deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"perl-doc\", reference:\"5.14.2-21+deb7u4\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"perl-modules\", reference:\"5.14.2-21+deb7u4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T09:49:43", "description": "Multiple vulnerabilities were discovered in the implementation of the\nPerl programming language. The Common Vulnerabilities and Exposures\nproject identifies the following problems :\n\n - CVE-2016-1238\n John Lightsey and Todd Rinaldo reported that the\n opportunistic loading of optional modules can make many\n programs unintentionally load code from the current\n working directory (which might be changed to another\n directory without the user realising) and potentially\n leading to privilege escalation, as demonstrated in\n Debian with certain combinations of installed packages.\n\n The problem relates to Perl loading modules from the includes\n directory array ('@INC') in which the last element is the current\n directory ('.'). That means that, when 'perl' wants to load a module\n (during first compilation or during lazy loading of a module in run\n time), perl will look for the module in the current directory at the\n end, since '.' is the last include directory in its array of include\n directories to seek. The issue is with requiring libraries that are\n in '.' but are not otherwise installed.\n\n With this update several modules which are known to be vulnerable\n are updated to not load modules from current directory.\n\n Additionally the update allows configurable removal of '.' from @INC\n in /etc/perl/sitecustomize.pl for a transitional period. It is\n recommended to enable this setting if the possible breakage for a\n specific site has been evaluated. Problems in packages provided in\n Debian resulting from the switch to the removal of '.' from @INC\n should be reported to the Perl maintainers at\n perl@packages.debian.org .\n\n It is planned to switch to the default removal of '.' in @INC in a\n subsequent update to perl via a point release if possible, and in\n any case for the upcoming stable release Debian 9 (stretch).\n\n - CVE-2016-6185\n It was discovered that XSLoader, a core module from Perl\n to dynamically load C libraries into Perl code, could\n load shared library from incorrect location. XSLoader\n uses caller() information to locate the .so file to\n load. This can be incorrect if XSLoader::load() is\n called in a string eval. An attacker can take advantage\n of this flaw to execute arbitrary code.", "edition": 25, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-07-26T00:00:00", "title": "Debian DSA-3628-1 : perl - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238"], "modified": "2016-07-26T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:perl"], "id": "DEBIAN_DSA-3628.NASL", "href": "https://www.tenable.com/plugins/nessus/92548", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3628. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92548);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-1238\", \"CVE-2016-6185\");\n script_xref(name:\"DSA\", value:\"3628\");\n\n script_name(english:\"Debian DSA-3628-1 : perl - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities were discovered in the implementation of the\nPerl programming language. The Common Vulnerabilities and Exposures\nproject identifies the following problems :\n\n - CVE-2016-1238\n John Lightsey and Todd Rinaldo reported that the\n opportunistic loading of optional modules can make many\n programs unintentionally load code from the current\n working directory (which might be changed to another\n directory without the user realising) and potentially\n leading to privilege escalation, as demonstrated in\n Debian with certain combinations of installed packages.\n\n The problem relates to Perl loading modules from the includes\n directory array ('@INC') in which the last element is the current\n directory ('.'). That means that, when 'perl' wants to load a module\n (during first compilation or during lazy loading of a module in run\n time), perl will look for the module in the current directory at the\n end, since '.' is the last include directory in its array of include\n directories to seek. The issue is with requiring libraries that are\n in '.' but are not otherwise installed.\n\n With this update several modules which are known to be vulnerable\n are updated to not load modules from current directory.\n\n Additionally the update allows configurable removal of '.' from @INC\n in /etc/perl/sitecustomize.pl for a transitional period. It is\n recommended to enable this setting if the possible breakage for a\n specific site has been evaluated. Problems in packages provided in\n Debian resulting from the switch to the removal of '.' from @INC\n should be reported to the Perl maintainers at\n perl@packages.debian.org .\n\n It is planned to switch to the default removal of '.' in @INC in a\n subsequent update to perl via a point release if possible, and in\n any case for the upcoming stable release Debian 9 (stretch).\n\n - CVE-2016-6185\n It was discovered that XSLoader, a core module from Perl\n to dynamically load C libraries into Perl code, could\n load shared library from incorrect location. XSLoader\n uses caller() information to locate the .so file to\n load. This can be incorrect if XSLoader::load() is\n called in a string eval. An attacker can take advantage\n of this flaw to execute arbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829578\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1238\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-6185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2016-1238\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/perl\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3628\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the perl packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 5.20.2-3+deb8u6. Additionally this update includes the\nfollowing updated packages to address optional module loading\nvulnerabilities related to CVE-2016-1238, or to address build failures\nwhich occur when '.' is removed from @INC :\n\n - cdbs 0.4.130+deb8u1\n - debhelper 9.20150101+deb8u2\n\n - devscripts 2.15.3+deb8u12\n\n - exim4 4.84.2-2+deb8u12\n\n - libintl-perl 1.23-1+deb8u12\n\n - libmime-charset-perl 1.011.1-1+deb8u22\n\n - libmime-encwords-perl 1.014.3-1+deb8u12\n\n - libmodule-build-perl 0.421000-2+deb8u12\n\n - libnet-dns-perl 0.81-2+deb8u12\n\n - libsys-syslog-perl 0.33-1+deb8u12\n\n - libunicode-linebreak-perl 0.0.20140601-2+deb8u22\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/08/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libperl-dev\", reference:\"5.20.2-3+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libperl5.20\", reference:\"5.20.2-3+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"perl\", reference:\"5.20.2-3+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"perl-base\", reference:\"5.20.2-3+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"perl-debug\", reference:\"5.20.2-3+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"perl-doc\", reference:\"5.20.2-3+deb8u6\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"perl-modules\", reference:\"5.20.2-3+deb8u6\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T09:03:57", "description": "According to the versions of the perl packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - Integer underflow in regcomp.c in Perl before 5.20, as\n used in Apple OS X before 10.10.5 and other products,\n allows context-dependent attackers to execute arbitrary\n code or cause a denial of service (application crash)\n via a long digit string associated with an invalid\n backreference within a regular\n expression.(CVE-2013-7422)\n\n - 1) cpan/Archive-Tar/bin/ptar, (2)\n cpan/Archive-Tar/bin/ptardiff, (3)\n cpan/Archive-Tar/bin/ptargrep, (4)\n cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6)\n cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess,\n (8) cpan/Encode/bin/piconv, (9)\n cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump,\n (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12)\n cpan/IO-Compress/bin/zipdetails, (13)\n cpan/JSON-PP/bin/json_pp, (14)\n cpan/Test-Harness/bin/prove, (15)\n dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16)\n dist/Module-CoreList/corelist, (17)\n ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19)\n utils/h2ph.PL, (20) utils/h2xs.PL, (21)\n utils/libnetcfg.PL, (22) utils/perlbug.PL, (23)\n utils/perldoc.PL, (24) utils/perlivp.PL, and (25)\n utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24\n before 5.24.1-RC2 do not properly remove . (period)\n characters from the end of the includes directory\n array, which might allow local users to gain privileges\n via a Trojan horse module under the current working\n directory.(CVE-2016-1238)\n\n - The XSLoader::load method in XSLoader in Perl does not\n properly locate .so files when called in a string eval,\n which might allow local users to execute arbitrary code\n via a Trojan horse library under the current working\n directory.(CVE-2016-6185)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 5, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-04-16T00:00:00", "title": "EulerOS Virtualization 3.0.2.2 : perl (EulerOS-SA-2020-1476)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238", "CVE-2013-7422"], "modified": "2020-04-16T00:00:00", "cpe": ["cpe:/o:huawei:euleros:uvp:3.0.2.2", "p-cpe:/a:huawei:euleros:perl-Pod-Escapes", "p-cpe:/a:huawei:euleros:perl", "p-cpe:/a:huawei:euleros:perl-libs", "p-cpe:/a:huawei:euleros:perl-macros"], "id": "EULEROS_SA-2020-1476.NASL", "href": "https://www.tenable.com/plugins/nessus/135638", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(135638);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2013-7422\",\n \"CVE-2016-1238\",\n \"CVE-2016-6185\"\n );\n script_bugtraq_id(\n 75704\n );\n\n script_name(english:\"EulerOS Virtualization 3.0.2.2 : perl (EulerOS-SA-2020-1476)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the perl packages installed, the EulerOS\nVirtualization installation on the remote host is affected by the\nfollowing vulnerabilities :\n\n - Integer underflow in regcomp.c in Perl before 5.20, as\n used in Apple OS X before 10.10.5 and other products,\n allows context-dependent attackers to execute arbitrary\n code or cause a denial of service (application crash)\n via a long digit string associated with an invalid\n backreference within a regular\n expression.(CVE-2013-7422)\n\n - 1) cpan/Archive-Tar/bin/ptar, (2)\n cpan/Archive-Tar/bin/ptardiff, (3)\n cpan/Archive-Tar/bin/ptargrep, (4)\n cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6)\n cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess,\n (8) cpan/Encode/bin/piconv, (9)\n cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump,\n (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12)\n cpan/IO-Compress/bin/zipdetails, (13)\n cpan/JSON-PP/bin/json_pp, (14)\n cpan/Test-Harness/bin/prove, (15)\n dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16)\n dist/Module-CoreList/corelist, (17)\n ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19)\n utils/h2ph.PL, (20) utils/h2xs.PL, (21)\n utils/libnetcfg.PL, (22) utils/perlbug.PL, (23)\n utils/perldoc.PL, (24) utils/perlivp.PL, and (25)\n utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24\n before 5.24.1-RC2 do not properly remove . (period)\n characters from the end of the includes directory\n array, which might allow local users to gain privileges\n via a Trojan horse module under the current working\n directory.(CVE-2016-1238)\n\n - The XSLoader::load method in XSLoader in Perl does not\n properly locate .so files when called in a string eval,\n which might allow local users to execute arbitrary code\n via a Trojan horse library under the current working\n directory.(CVE-2016-6185)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1476\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?33069519\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected perl packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/04/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perl-Pod-Escapes\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perl-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perl-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.2\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.2\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"perl-5.16.3-292.h11.eulerosv2r7\",\n \"perl-Pod-Escapes-1.04-292.h11.eulerosv2r7\",\n \"perl-libs-5.16.3-292.h11.eulerosv2r7\",\n \"perl-macros-5.16.3-292.h11.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:29:12", "description": "This update for Perl fixes the following issues :\n\n - CVE-2016-6185: Xsloader looking at a '(eval)' directory.\n (bsc#988311)\n\n - CVE-2016-1238: Searching current directory for optional\n modules. (bsc#987887)\n\n - CVE-2015-8853: Regular expression engine hanging on bad\n utf8. (bsc)\n\n - CVE-2016-2381: Environment dup handling bug.\n (bsc#967082)\n\n - 'Insecure dependency in require' error in taint mode.\n (bsc#984906)\n\n - Memory leak in 'use utf8' handling. (bsc#928292)\n\n - Missing lock prototype to the debugger. (bsc#932894)\n\nThis update was imported from the SUSE:SLE-12:Update update project.", "edition": 19, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-09-19T00:00:00", "title": "openSUSE Security Update : perl (openSUSE-2016-1086)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238", "CVE-2016-2381", "CVE-2015-8853"], "modified": "2016-09-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:perl", "p-cpe:/a:novell:opensuse:perl-base", "p-cpe:/a:novell:opensuse:perl-base-debuginfo-32bit", "p-cpe:/a:novell:opensuse:perl-base-32bit", "cpe:/o:novell:opensuse:42.1", "p-cpe:/a:novell:opensuse:perl-debugsource", "p-cpe:/a:novell:opensuse:perl-base-debuginfo", "p-cpe:/a:novell:opensuse:perl-32bit", "p-cpe:/a:novell:opensuse:perl-debuginfo-32bit", "p-cpe:/a:novell:opensuse:perl-debuginfo"], "id": "OPENSUSE-2016-1086.NASL", "href": "https://www.tenable.com/plugins/nessus/93583", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2016-1086.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93583);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-8853\", \"CVE-2016-1238\", \"CVE-2016-2381\", \"CVE-2016-6185\");\n\n script_name(english:\"openSUSE Security Update : perl (openSUSE-2016-1086)\");\n script_summary(english:\"Check for the openSUSE-2016-1086 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for Perl fixes the following issues :\n\n - CVE-2016-6185: Xsloader looking at a '(eval)' directory.\n (bsc#988311)\n\n - CVE-2016-1238: Searching current directory for optional\n modules. (bsc#987887)\n\n - CVE-2015-8853: Regular expression engine hanging on bad\n utf8. (bsc)\n\n - CVE-2016-2381: Environment dup handling bug.\n (bsc#967082)\n\n - 'Insecure dependency in require' error in taint mode.\n (bsc#984906)\n\n - Memory leak in 'use utf8' handling. (bsc#928292)\n\n - Missing lock prototype to the debugger. (bsc#932894)\n\nThis update was imported from the SUSE:SLE-12:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=928292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=932894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=967082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=984906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=987887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=988311\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected perl packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-base-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-base-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-base-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-base-debuginfo-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-debuginfo-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"perl-debugsource-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"perl-32bit-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"perl-base-32bit-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"perl-base-debuginfo-32bit-5.18.2-5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"perl-debuginfo-32bit-5.18.2-5.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl-32bit / perl / perl-base-32bit / perl-base / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T14:24:40", "description": "This update for Perl fixes the following issues :\n\n - CVE-2016-6185: Xsloader looking at a '(eval)' directory.\n (bsc#988311)\n\n - CVE-2016-1238: Searching current directory for optional\n modules. (bsc#987887)\n\n - CVE-2015-8853: Regular expression engine hanging on bad\n utf8. (bsc)\n\n - CVE-2016-2381: Environment dup handling bug.\n (bsc#967082)\n\n - 'Insecure dependency in require' error in taint mode.\n (bsc#984906)\n\n - Memory leak in 'use utf8' handling. (bsc#928292)\n\n - Missing lock prototype to the debugger. (bsc#932894)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 29, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-09-12T00:00:00", "title": "SUSE SLED12 / SLES12 Security Update : perl (SUSE-SU-2016:2263-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238", "CVE-2016-2381", "CVE-2015-8853"], "modified": "2016-09-12T00:00:00", "cpe": ["cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:perl-debugsource", "p-cpe:/a:novell:suse_linux:perl-base", "p-cpe:/a:novell:suse_linux:perl", "p-cpe:/a:novell:suse_linux:perl-base-debuginfo", "p-cpe:/a:novell:suse_linux:perl-debuginfo"], "id": "SUSE_SU-2016-2263-1.NASL", "href": "https://www.tenable.com/plugins/nessus/93437", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:2263-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93437);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-8853\", \"CVE-2016-1238\", \"CVE-2016-2381\", \"CVE-2016-6185\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : perl (SUSE-SU-2016:2263-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for Perl fixes the following issues :\n\n - CVE-2016-6185: Xsloader looking at a '(eval)' directory.\n (bsc#988311)\n\n - CVE-2016-1238: Searching current directory for optional\n modules. (bsc#987887)\n\n - CVE-2015-8853: Regular expression engine hanging on bad\n utf8. (bsc)\n\n - CVE-2016-2381: Environment dup handling bug.\n (bsc#967082)\n\n - 'Insecure dependency in require' error in taint mode.\n (bsc#984906)\n\n - Memory leak in 'use utf8' handling. (bsc#928292)\n\n - Missing lock prototype to the debugger. (bsc#932894)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=928292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=932894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=984906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=987887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=988311\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8853/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-1238/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2381/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6185/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20162263-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?beccfb06\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP1:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2016-1326=1\n\nSUSE Linux Enterprise Desktop 12-SP1:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP1-2016-1326=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"perl-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"perl-base-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"perl-base-debuginfo-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"perl-debuginfo-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"perl-debugsource-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"perl-32bit-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"perl-debuginfo-32bit-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-32bit-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-base-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-base-debuginfo-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-debuginfo-32bit-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-debuginfo-5.18.2-11.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"1\", cpu:\"x86_64\", reference:\"perl-debugsource-5.18.2-11.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-20T14:46:23", "description": "This update for perl fixes the following issues :\n\n - CVE-2016-6185: xsloader looking at a '(eval)' directory\n [bsc#988311]\n\n - CVE-2016-1238: searching current directory for optional\n modules [bsc#987887]\n\n - CVE-2015-8853: regex engine hanging on bad utf8\n [bnc976584]\n\n - CVE-2016-2381: environment dup handling bug [bsc#967082]\n\n - perl panic with utf8_mg_pos_cache_update [bsc#929027]\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-09-08T00:00:00", "title": "SUSE SLES11 Security Update : perl (SUSE-SU-2016:2246-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238", "CVE-2016-2381", "CVE-2015-8853"], "modified": "2016-09-08T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:perl-doc", "p-cpe:/a:novell:suse_linux:perl-Module-Build", "p-cpe:/a:novell:suse_linux:perl-Test-Simple", "p-cpe:/a:novell:suse_linux:perl-base", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:perl"], "id": "SUSE_SU-2016-2246-1.NASL", "href": "https://www.tenable.com/plugins/nessus/93371", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2016:2246-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93371);\n script_version(\"2.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-8853\", \"CVE-2016-1238\", \"CVE-2016-2381\", \"CVE-2016-6185\");\n\n script_name(english:\"SUSE SLES11 Security Update : perl (SUSE-SU-2016:2246-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for perl fixes the following issues :\n\n - CVE-2016-6185: xsloader looking at a '(eval)' directory\n [bsc#988311]\n\n - CVE-2016-1238: searching current directory for optional\n modules [bsc#987887]\n\n - CVE-2015-8853: regex engine hanging on bad utf8\n [bnc976584]\n\n - CVE-2016-2381: environment dup handling bug [bsc#967082]\n\n - perl panic with utf8_mg_pos_cache_update [bsc#929027]\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=929027\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=967082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=987887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=988311\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8853/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-1238/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-2381/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2016-6185/\"\n );\n # https://www.suse.com/support/update/announcement/2016/suse-su-20162246-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fe9a73d0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t\npatch sdksp4-perl-12729=1\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-perl-12729=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch\ndbgsp4-perl-12729=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-Module-Build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-Test-Simple\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:perl-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/04/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"perl-32bit-5.10.0-64.80.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"s390x\", reference:\"perl-32bit-5.10.0-64.80.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"perl-5.10.0-64.80.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"perl-Module-Build-0.2808.01-0.80.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"perl-Test-Simple-0.72-0.80.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"perl-base-5.10.0-64.80.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"perl-doc-5.10.0-64.80.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"perl\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T11:05:47", "description": "The remote host is affected by the vulnerability described in GLSA-201701-75\n(Perl: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Perl. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, or\n escalate privileges.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-01-30T00:00:00", "title": "GLSA-201701-75 : Perl: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-8607", "CVE-2016-6185", "CVE-2016-1238", "CVE-2016-2381", "CVE-2015-8853"], "modified": "2017-01-30T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:perl", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201701-75.NASL", "href": "https://www.tenable.com/plugins/nessus/96861", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201701-75.\n#\n# The advisory text is Copyright (C) 2001-2017 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(96861);\n script_version(\"3.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-8607\", \"CVE-2015-8853\", \"CVE-2016-1238\", \"CVE-2016-2381\", \"CVE-2016-6185\");\n script_xref(name:\"GLSA\", value:\"201701-75\");\n\n script_name(english:\"GLSA-201701-75 : Perl: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201701-75\n(Perl: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Perl. Please review the\n CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, or\n escalate privileges.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://wiki.gentoo.org/wiki/Perl#Upgrading_.28major_version.29\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201701-75\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Perl users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-lang/perl-5.22.3_rc4'\n Warning: When you are upgrading to a new major Perl version, the\n commands above may not be sufficient. Please visit the Gentoo wiki\n referenced below to learn how to upgrade to a new major Perl version.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2017-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-lang/perl\", unaffected:make_list(\"ge 5.22.3_rc4\"), vulnerable:make_list(\"lt 5.22.3_rc4\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Perl\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-06T10:49:24", "description": "Jakub Wilk reports :\n\nXSLoader tries to load code from a subdirectory in the cwd when called\ninside a string eval", "edition": 25, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-08-05T00:00:00", "title": "FreeBSD : p5-XSLoader -- local arbitrary code execution (3e08047f-5a6c-11e6-a6c3-14dae9d210b8)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "modified": "2016-08-05T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:p5-XSLoader", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:perl5.22", "p-cpe:/a:freebsd:freebsd:perl5-devel", "p-cpe:/a:freebsd:freebsd:perl5", "p-cpe:/a:freebsd:freebsd:perl5.24", "p-cpe:/a:freebsd:freebsd:perl5.20", "p-cpe:/a:freebsd:freebsd:perl", "p-cpe:/a:freebsd:freebsd:perl5.18"], "id": "FREEBSD_PKG_3E08047F5A6C11E6A6C314DAE9D210B8.NASL", "href": "https://www.tenable.com/plugins/nessus/92739", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92739);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2016-6185\");\n\n script_name(english:\"FreeBSD : p5-XSLoader -- local arbitrary code execution (3e08047f-5a6c-11e6-a6c3-14dae9d210b8)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Jakub Wilk reports :\n\nXSLoader tries to load code from a subdirectory in the cwd when called\ninside a string eval\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829578\"\n );\n # https://vuxml.freebsd.org/freebsd/3e08047f-5a6c-11e6-a6c3-14dae9d210b8.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4b45e499\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:p5-XSLoader\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:perl5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:perl5-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:perl5.18\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:perl5.20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:perl5.22\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:perl5.24\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"p5-XSLoader<0.22\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5<5.18.4_24\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5>=5.20<5.20.3_15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5>=5.21<5.22.3.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5>=5.23<5.24.1.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5>=5.25<5.25.2.87\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.18<5.18.4_24\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.18>=5.20<5.20.3_15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.18>=5.21<5.22.3.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.18>=5.23<5.24.1.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.18>=5.25<5.25.2.87\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.20<5.18.4_24\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.20>=5.20<5.20.3_15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.20>=5.21<5.22.3.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.20>=5.23<5.24.1.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.20>=5.25<5.25.2.87\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.22<5.18.4_24\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.22>=5.20<5.20.3_15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.22>=5.21<5.22.3.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.22>=5.23<5.24.1.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.22>=5.25<5.25.2.87\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.24<5.18.4_24\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.24>=5.20<5.20.3_15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.24>=5.21<5.22.3.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.24>=5.23<5.24.1.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5.24>=5.25<5.25.2.87\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5-devel<5.18.4_24\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5-devel>=5.20<5.20.3_15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5-devel>=5.21<5.22.3.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5-devel>=5.23<5.24.1.r2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl5-devel>=5.25<5.25.2.87\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"perl>=0\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:15:00", "description": "This fixes CVE-2016-6185 vulnerability (do not let XSLoader load\nrelative paths).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-07-18T00:00:00", "title": "Fedora 22 : 4:perl (2016-eb2592245b)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "modified": "2016-07-18T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:22", "p-cpe:/a:fedoraproject:fedora:4:perl"], "id": "FEDORA_2016-EB2592245B.NASL", "href": "https://www.tenable.com/plugins/nessus/92335", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-eb2592245b.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92335);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-6185\");\n script_xref(name:\"FEDORA\", value:\"2016-eb2592245b\");\n\n script_name(english:\"Fedora 22 : 4:perl (2016-eb2592245b)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This fixes CVE-2016-6185 vulnerability (do not let XSLoader load\nrelative paths).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-eb2592245b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 4:perl package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:4:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:22\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/08/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^22([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 22\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC22\", reference:\"perl-5.20.3-332.fc22\", epoch:\"4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"4:perl\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T10:14:23", "description": "This fixes CVE-2016-6185 vulnerability (do not let XSLoader load\nrelative paths).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-07-19T00:00:00", "title": "Fedora 23 : 4:perl (2016-742bde2be7)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "modified": "2016-07-19T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:23", "p-cpe:/a:fedoraproject:fedora:4:perl"], "id": "FEDORA_2016-742BDE2BE7.NASL", "href": "https://www.tenable.com/plugins/nessus/92388", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-742bde2be7.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92388);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-6185\");\n script_xref(name:\"FEDORA\", value:\"2016-742bde2be7\");\n\n script_name(english:\"Fedora 23 : 4:perl (2016-742bde2be7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This fixes CVE-2016-6185 vulnerability (do not let XSLoader load\nrelative paths).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-742bde2be7\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 4:perl package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:4:perl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:23\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/08/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^23([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 23\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC23\", reference:\"perl-5.22.2-353.fc23\", epoch:\"4\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"4:perl\");\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2020-08-12T01:02:38", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6185", "CVE-2016-1238"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3628-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nJuly 25, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : perl\nCVE ID : CVE-2016-1238 CVE-2016-6185\nDebian Bug : 829578\n\nMultiple vulnerabilities were discovered in the implementation of the\nPerl programming language. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-1238\n\n John Lightsey and Todd Rinaldo reported that the opportunistic\n loading of optional modules can make many programs unintentionally\n load code from the current working directory (which might be changed\n to another directory without the user realising) and potentially\n leading to privilege escalation, as demonstrated in Debian with\n certain combinations of installed packages.\n\n The problem relates to Perl loading modules from the includes\n directory array ("@INC") in which the last element is the current\n directory ("."). That means that, when "perl" wants to load a module\n (during first compilation or during lazy loading of a module in run-\n time), perl will look for the module in the current directory at the\n end, since '.' is the last include directory in its array of include\n directories to seek. The issue is with requiring libraries that are\n in "." but are not otherwise installed.\n\n With this update several modules which are known to be vulnerable\n are updated to not load modules from current directory.\n\n Additionally the update allows configurable removal of "." from @INC\n in /etc/perl/sitecustomize.pl for a transitional period. It is\n recommended to enable this setting if the possible breakage for a\n specific site has been evaluated. Problems in packages provided in\n Debian resulting from the switch to the removal of '.' from @INC\n should be reported to the Perl maintainers at\n perl@packages.debian.org .\n\n It is planned to switch to the default removal of '.' in @INC in a\n subsequent update to perl via a point release if possible, and in\n any case for the upcoming stable release Debian 9 (stretch).\n\nCVE-2016-6185\n\n It was discovered that XSLoader, a core module from Perl to\n dynamically load C libraries into Perl code, could load shared\n library from incorrect location. XSLoader uses caller() information\n to locate the .so file to load. This can be incorrect if\n XSLoader::load() is called in a string eval. An attacker can take\n advantage of this flaw to execute arbitrary code.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 5.20.2-3+deb8u6. Additionally this update includes the\nfollowing updated packages to address optional module loading\nvulnerabilities related to CVE-2016-1238, or to address build failures\nwhich occur when '.' is removed from @INC:\n\n - cdbs 0.4.130+deb8u1\n - debhelper 9.20150101+deb8u2\n - devscripts 2.15.3+deb8u1\n - exim4 4.84.2-2+deb8u1\n - libintl-perl 1.23-1+deb8u1\n - libmime-charset-perl 1.011.1-1+deb8u2\n - libmime-encwords-perl 1.014.3-1+deb8u1\n - libmodule-build-perl 0.421000-2+deb8u1\n - libnet-dns-perl 0.81-2+deb8u1\n - libsys-syslog-perl 0.33-1+deb8u1\n - libunicode-linebreak-perl 0.0.20140601-2+deb8u2\n\nWe recommend that you upgrade your perl packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 6, "modified": "2016-07-25T14:18:56", "published": "2016-07-25T14:18:56", "id": "DEBIAN:DSA-3628-1:D8F67", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2016/msg00206.html", "title": "[SECURITY] [DSA 3628-1] perl security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-30T02:22:35", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6185", "CVE-2016-1238"], "description": "Package : perl\nVersion : 5.14.2-21+deb7u4\nCVE ID : CVE-2016-1238 CVE-2016-6185\nDebian Bug : 829578\n\nMultiple vulnerabilities were discovered in the implementation of the\nPerl programming language. The Common Vulnerabilities and Exposures\nproject identifies the following problems:\n\nCVE-2016-1238\n\n John Lightsey and Todd Rinaldo reported that the opportunistic\n loading of optional modules can make many programs unintentionally\n load code from the current working directory (which might be changed\n to another directory without the user realising) and potentially\n leading to privilege escalation, as demonstrated in Debian with\n certain combinations of installed packages.\n\n The problem relates to Perl loading modules from the includes\n directory array ("@INC") in which the last element is the current\n directory ("."). That means that, when "perl" wants to load a module\n (during first compilation or during lazy loading of a module in run-\n time), perl will look for the module in the current directory at the\n end, since '.' is the last include directory in its array of include\n directories to seek. The issue is with requiring libraries that are\n in "." but are not otherwise installed.\n\n With this update several modules which are known to be vulnerable\n are updated to not load modules from current directory.\n\n Additionally the update allows configurable removal of "." from @INC\n in /etc/perl/sitecustomize.pl for a transitional period. It is\n recommended to enable this setting if the possible breakage for a\n specific site has been evaluated. Problems in packages provided in\n Debian resulting from the switch to the removal of '.' from @INC\n should be reported to the Perl maintainers at\n perl@packages.debian.org .\n\nCVE-2016-6185\n\n It was discovered that XSLoader, a core module from Perl to\n dynamically load C libraries into Perl code, could load shared\n library from incorrect location. XSLoader uses caller() information\n to locate the .so file to load. This can be incorrect if\n XSLoader::load() is called in a string eval. An attacker can take\n advantage of this flaw to execute arbitrary code.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n5.14.2-21+deb7u4.\n\nWe recommend that you upgrade your perl packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 3, "modified": "2016-07-28T16:03:35", "published": "2016-07-28T16:03:35", "id": "DEBIAN:DLA-565-1:83AD7", "href": "https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201607/msg00027.html", "title": "[SECURITY] [DLA 565-1] perl security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-30T02:21:39", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238"], "description": "Package : libsys-syslog-perl\nVersion : 0.29-1+deb7u1\nCVE ID : CVE-2016-1238\n\nJohn Lightsey and Todd Rinaldo reported that the opportunistic loading\nof optional modules can make many programs unintentionally load code\nfrom the current working directory (which might be changed to another\ndirectory without the user realising) and potentially leading to\nprivilege escalation, as demonstrated in Debian with certain\ncombinations of installed packages.\n\nThe problem relates to Perl loading modules from the includes directory\narray ("@INC") in which the last element is the current directory (".").\nThat means that, when "perl" wants to load a module (during first\ncompilation or during lazy loading of a module in run time), perl will\nlook for the module in the current directory at the end, since '.' is\nthe last include directory in its array of include directories to seek.\nThe issue is with requiring libraries that are in "." but are not\notherwise installed.\n\nWith this update the Sys::Syslog Perl module is updated to not load\nmodules from current directory.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n0.29-1+deb7u1.\n\nWe recommend that you upgrade your libsys-syslog-perl packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 2, "modified": "2016-08-04T14:35:10", "published": "2016-08-04T14:35:10", "id": "DEBIAN:DLA-584-1:EF94A", "href": "https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201608/msg00006.html", "title": "[SECURITY] [DLA 584-1] libsys-syslog-perl security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-12T01:01:25", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15705", "CVE-2016-1238", "CVE-2018-11781", "CVE-2018-11780"], "description": "Package : spamassassin\nVersion : 3.4.2-0+deb8u1\nCVE ID : CVE-2016-1238 CVE-2017-15705 CVE-2018-11780 CVE-2018-11781\nDebian Bug : 784023 865924 883775 889501 891041 908969 908970 908971 913571\n\nMultiple vulnerabilities were found in Spamassassin, which could lead\nto Remote Code Execution and Denial of Service attacks under certain\ncircumstances.\n\nCVE-2016-1238\n\n Many Perl programs do not properly remove . (period) characters\n from the end of the includes directory array, which might allow\n local users to gain privileges via a Trojan horse module under the\n current working directory.\n\nCVE-2017-15705\n\n A denial of service vulnerability was identified that exists in\n Apache SpamAssassin before 3.4.2. The vulnerability arises with\n certain unclosed tags in emails that cause markup to be handled\n incorrectly leading to scan timeouts. This can cause carefully\n crafted emails that might take more scan time than expected\n leading to a Denial of Service.\n\nCVE-2018-11780\n\n A potential Remote Code Execution bug exists with the PDFInfo\n plugin in Apache SpamAssassin before 3.4.2.\n\nCVE-2018-11781\n\n Apache SpamAssassin 3.4.2 fixes a local user code injection in the\n meta rule syntax.\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n3.4.2-0+deb8u1. Upstream strongly advocates upgrading to the latest\nupstream version so we are following that recommendation and\nbackported the version published as part of the 9.6 stretch release,\nwhich also fixes many critical bugs.\n\nWe recommend that you upgrade your spamassassin packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n\n-- \n", "edition": 11, "modified": "2018-11-13T19:06:40", "published": "2018-11-13T19:06:40", "id": "DEBIAN:DLA-1578-1:2E319", "href": "https://lists.debian.org/debian-lts-announce/2018/debian-lts-announce-201811/msg00016.html", "title": "[SECURITY] [DLA 1578-1] spamassassin security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2019-05-29T18:35:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238"], "description": "Multiple vulnerabilities were discovered in\nthe implementation of the Perl programming language. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2016-1238\nJohn Lightsey and Todd Rinaldo reported that the opportunistic\nloading of optional modules can make many programs unintentionally\nload code from the current working directory (which might be changed\nto another directory without the user realising) and potentially\nleading to privilege escalation, as demonstrated in Debian with\ncertain combinations of installed packages.\n\nThe problem relates to Perl loading modules from the includes\ndirectory array (", "modified": "2019-03-18T00:00:00", "published": "2016-08-02T00:00:00", "id": "OPENVAS:1361412562310703628", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703628", "type": "openvas", "title": "Debian Security Advisory DSA 3628-1 (perl - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3628.nasl 3784 2016-08-02 08:07:52Z antu123 $\n# Auto-generated from advisory DSA 3628-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703628\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-1238\", \"CVE-2016-6185\");\n script_name(\"Debian Security Advisory DSA 3628-1 (perl - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-02 10:56:30 +0530 (Tue, 02 Aug 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3628.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"perl on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie),\nthese problems have been fixed in version 5.20.2-3+deb8u6. Additionally this update\nincludes the following updated packages to address optional module loading\nvulnerabilities related to CVE-2016-1238\n,\nor to address build failures which occur when '.' is removed from @INC:\n\ncdbs 0.4.130+deb8u1debhelper 9.20150101+deb8u2devscripts 2.15.3+deb8u12exim4\n4.84.2-2+deb8u12libintl-perl 1.23-1+deb8u12libmime-charset-perl\n1.011.1-1+deb8u22libmime-encwords-perl 1.014.3-1+deb8u12libmodule-build-perl\n0.421000-2+deb8u12libnet-dns-perl 0.81-2+deb8u12libsys-syslog-perl\n0.33-1+deb8u12libunicode-linebreak-perl 0.0.20140601-2+deb8u22\nWe recommend that you upgrade your perl packages.\");\n script_tag(name:\"summary\", value:\"Multiple vulnerabilities were discovered in\nthe implementation of the Perl programming language. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2016-1238\nJohn Lightsey and Todd Rinaldo reported that the opportunistic\nloading of optional modules can make many programs unintentionally\nload code from the current working directory (which might be changed\nto another directory without the user realising) and potentially\nleading to privilege escalation, as demonstrated in Debian with\ncertain combinations of installed packages.\n\nThe problem relates to Perl loading modules from the includes\ndirectory array ('@INC') in which the last element is the current\ndirectory ('.'). That means that, when perl\nwants to load a module\n(during first compilation or during lazy loading of a module in run\ntime), perl will look for the module in the current directory at the\nend, since '.' is the last include directory in its array of include\ndirectories to seek. The issue is with requiring libraries that are\nin '.' but are not otherwise installed.\n\nWith this update several modules which are known to be vulnerable\nare updated to not load modules from current directory.\n\nAdditionally the update allows configurable removal of '.' from @INC\nin /etc/perl/sitecustomize.pl for a transitional period. It is\nrecommended to enable this setting if the possible breakage for a\nspecific site has been evaluated. Problems in packages provided in\nDebian resulting from the switch to the removal of '.' from @INC\nshould be reported to the Perl maintainers at\nperl@packages.debian.org .\n\nIt is planned to switch to the default removal of '.' in @INC in a\nsubsequent update to perl via a point release if possible, and in\nany case for the upcoming stable release Debian 9 (stretch).\n\nCVE-2016-6185\nIt was discovered that XSLoader, a core module from Perl to\ndynamically load C libraries into Perl code, could load shared\nlibrary from incorrect location. XSLoader uses caller() information\nto locate the .so file to load. This can be incorrect if\nXSLoader::load() is called in a string eval. An attacker can take\nadvantage of this flaw to execute arbitrary code.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libperl-dev\", ver:\"5.20.2-3+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libperl5.20\", ver:\"5.20.2-3+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"perl\", ver:\"5.20.2-3+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"perl-base\", ver:\"5.20.2-3+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"perl-debug\", ver:\"5.20.2-3+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"perl-doc\", ver:\"5.20.2-3+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"perl-modules\", ver:\"5.20.2-3+deb8u6\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-17T16:57:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2016-1238", "CVE-2013-7422"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-04-16T00:00:00", "published": "2020-04-16T00:00:00", "id": "OPENVAS:1361412562311220201476", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201476", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2020-1476)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from the referenced\n# advisories, and are Copyright (C) by the respective right holder(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1476\");\n script_version(\"2020-04-16T05:57:45+0000\");\n script_cve_id(\"CVE-2013-7422\", \"CVE-2016-1238\", \"CVE-2016-6185\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-16 05:57:45 +0000 (Thu, 16 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-04-16 05:57:45 +0000 (Thu, 16 Apr 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2020-1476)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.2\\.2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1476\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1476\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'perl' package(s) announced via the EulerOS-SA-2020-1476 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.(CVE-2013-7422)\n\n1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.(CVE-2016-1238)\n\nThe XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.(CVE-2016-6185)\");\n\n script_tag(name:\"affected\", value:\"'perl' package(s) on Huawei EulerOS Virtualization 3.0.2.2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.2.2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"perl\", rpm:\"perl~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.2.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-Pod-Escapes\", rpm:\"perl-Pod-Escapes~1.04~292.h11.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.2.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-libs\", rpm:\"perl-libs~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.2.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-macros\", rpm:\"perl-macros~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROSVIRT-3.0.2.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-08-02T00:00:00", "id": "OPENVAS:1361412562310808892", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808892", "type": "openvas", "title": "Fedora Update for perl FEDORA-2016-742bde2be7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl FEDORA-2016-742bde2be7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808892\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-02 10:57:07 +0530 (Tue, 02 Aug 2016)\");\n script_cve_id(\"CVE-2016-6185\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for perl FEDORA-2016-742bde2be7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"perl on Fedora 23\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-742bde2be7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC23\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC23\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl\", rpm:\"perl~5.22.2~353.fc23\", rls:\"FC23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-02-26T16:52:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-02-24T00:00:00", "published": "2020-02-24T00:00:00", "id": "OPENVAS:1361412562311220201122", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201122", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2020-1122)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1122\");\n script_version(\"2020-02-24T09:06:57+0000\");\n script_cve_id(\"CVE-2016-6185\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-02-24 09:06:57 +0000 (Mon, 24 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-24 09:06:57 +0000 (Mon, 24 Feb 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2020-1122)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1122\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1122\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'perl' package(s) announced via the EulerOS-SA-2020-1122 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.(CVE-2016-6185)\");\n\n script_tag(name:\"affected\", value:\"'perl' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"perl\", rpm:\"perl~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-core\", rpm:\"perl-core~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-devel\", rpm:\"perl-devel~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-libs\", rpm:\"perl-libs~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-macros\", rpm:\"perl-macros~5.16.3~292.h11.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-08-02T00:00:00", "id": "OPENVAS:1361412562310808895", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808895", "type": "openvas", "title": "Fedora Update for perl FEDORA-2016-485dff6060", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl FEDORA-2016-485dff6060\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808895\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-02 10:57:16 +0530 (Tue, 02 Aug 2016)\");\n script_cve_id(\"CVE-2016-6185\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for perl FEDORA-2016-485dff6060\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"perl on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-485dff6060\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl\", rpm:\"perl~5.22.2~361.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "description": "This host is installed with Perl\n and is prone to code execution vulnerability.", "modified": "2018-11-12T00:00:00", "published": "2016-11-24T00:00:00", "id": "OPENVAS:1361412562310809819", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310809819", "type": "openvas", "title": "Perl 'XSLoader Method' Code Execution Vulnerability (Windows)", "sourceData": "###################################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_perl_xsloader_code_execution_vuln_win.nasl 12313 2018-11-12 08:53:51Z asteins $\n#\n# Perl 'XSLoader Method' Code Execution Vulnerability (Windows)\n#\n# Authors:\n# Kashinath T <tkashinath@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:perl:perl\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.809819\");\n script_version(\"$Revision: 12313 $\");\n script_cve_id(\"CVE-2016-6185\");\n script_bugtraq_id(91685);\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-12 09:53:51 +0100 (Mon, 12 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-11-24 21:21:51 +0530 (Thu, 24 Nov 2016)\");\n script_name(\"Perl 'XSLoader Method' Code Execution Vulnerability (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Perl\n and is prone to code execution vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to The 'XSLoader::load'\n method in 'XSLoader' in Perl does not properly locate '.so' files when called in\n a string eval.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow\n local users to execute arbitrary code.\");\n\n script_tag(name:\"affected\", value:\"Perl 5.24.0.24 and before on Windows\");\n\n script_tag(name:\"solution\", value:\"Update Perl to version 5.24.1.2402 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2016/dsa-3628\");\n script_xref(name:\"URL\", value:\"http://www.openwall.com/lists/oss-security/2016/07/07/1\");\n\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod\", value:\"30\");\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_perl_detect_win.nasl\");\n script_mandatory_keys(\"Perl/Strawberry_or_Active/Installed\");\n script_xref(name:\"URL\", value:\"https://www.perl.org\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!perlVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less_equal(version:perlVer, test_version:\"5.24.0.24\"))\n{\n report = report_fixed_ver(installed_version:perlVer, fixed_version:'Ask Vendor for a solution');\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:05", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-08-02T00:00:00", "id": "OPENVAS:1361412562310808846", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808846", "type": "openvas", "title": "Fedora Update for perl FEDORA-2016-eb2592245b", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl FEDORA-2016-eb2592245b\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808846\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-02 10:55:03 +0530 (Tue, 02 Aug 2016)\");\n script_cve_id(\"CVE-2016-6185\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for perl FEDORA-2016-eb2592245b\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"perl on Fedora 22\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-eb2592245b\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC22\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC22\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl\", rpm:\"perl~5.20.3~332.fc22\", rls:\"FC22\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-06T01:09:32", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2014-4330"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-04-30T00:00:00", "published": "2020-04-30T00:00:00", "id": "OPENVAS:1361412562311220201527", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201527", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2020-1527)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1527\");\n script_version(\"2020-04-30T12:11:40+0000\");\n script_cve_id(\"CVE-2014-4330\", \"CVE-2016-6185\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-30 12:11:40 +0000 (Thu, 30 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-04-30 12:11:40 +0000 (Thu, 30 Apr 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2020-1527)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.2\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1527\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1527\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'perl' package(s) announced via the EulerOS-SA-2020-1527 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.(CVE-2016-6185)\n\nThe Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function.(CVE-2014-4330)\");\n\n script_tag(name:\"affected\", value:\"'perl' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.2.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.2.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"perl\", rpm:\"perl~5.16.3~292.h12\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-Pod-Escapes\", rpm:\"perl-Pod-Escapes~1.04~292.h12\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-libs\", rpm:\"perl-libs~5.16.3~292.h12\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-macros\", rpm:\"perl-macros~5.16.3~292.h12\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:38:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-6185", "CVE-2015-8853"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220192035", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220192035", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2019-2035)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.2035\");\n script_version(\"2020-01-23T12:31:33+0000\");\n script_cve_id(\"CVE-2015-8853\", \"CVE-2016-6185\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 12:31:33 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:31:33 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for perl (EulerOS-SA-2019-2035)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-2035\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2035\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'perl' package(s) announced via the EulerOS-SA-2019-2035 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by 'a\\x80.'(CVE-2015-8853)\n\nThe XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.(CVE-2016-6185)\");\n\n script_tag(name:\"affected\", value:\"'perl' package(s) on Huawei EulerOS V2.0SP3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"perl\", rpm:\"perl~5.16.3~285.h6\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-core\", rpm:\"perl-core~5.16.3~285.h6\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-devel\", rpm:\"perl-devel~5.16.3~285.h6\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-libs\", rpm:\"perl-libs~5.16.3~285.h6\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perl-macros\", rpm:\"perl-macros~5.16.3~285.h6\", rls:\"EULEROS-2.0SP3\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:35:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-1238"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-08-09T00:00:00", "id": "OPENVAS:1361412562310808760", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808760", "type": "openvas", "title": "Fedora Update for perl-Module-Load-Conditional FEDORA-2016-dd20a4631a", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for perl-Module-Load-Conditional FEDORA-2016-dd20a4631a\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808760\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-08-09 05:44:02 +0200 (Tue, 09 Aug 2016)\");\n script_cve_id(\"CVE-2016-1238\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for perl-Module-Load-Conditional FEDORA-2016-dd20a4631a\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'perl-Module-Load-Conditional'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"perl-Module-Load-Conditional on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-dd20a4631a\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"perl-Module-Load-Conditional\", rpm:\"perl-Module-Load-Conditional~0.68~1.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2017-01-30T00:59:41", "bulletinFamily": "unix", "cvelist": ["CVE-2015-8607", "CVE-2016-6185", "CVE-2016-1238", "CVE-2016-2381", "CVE-2015-8853"], "edition": 1, "description": "### Background\n\nPerl is a highly capable, feature-rich programming language.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Perl. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, or escalate privileges. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Perl users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-lang/perl-5.22.3_rc4\"", "modified": "2017-01-29T00:00:00", "published": "2017-01-29T00:00:00", "href": "https://security.gentoo.org/glsa/201701-75", "id": "GLSA-201701-75", "type": "gentoo", "title": "Perl: Multiple vulnerabilities", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-12-16T01:10:53", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15705", "CVE-2016-1238", "CVE-2018-11781", "CVE-2018-11780"], "description": "### Background\n\nSpamAssassin is an extensible email filter used to identify junk email.\n\n### Description\n\nMultiple vulnerabilities have been discovered in SpamAssassin. Please review the referenced CVE identifiers for details. \n\n### Impact\n\nA remote attacker could execute arbitrary code, escalate privileges, or cause a Denial of Service condition. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll SpamAssassin users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=mail-filter/spamassassin-3.4.2-r2\"", "edition": 1, "modified": "2018-12-15T00:00:00", "published": "2018-12-15T00:00:00", "id": "GLSA-201812-07", "href": "https://security.gentoo.org/glsa/201812-07", "title": "SpamAssassin: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "fedora": [{"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6185"], "description": "Perl is a high-level programming language with roots in C, sed, awk and she ll scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming. A la rge proportion of the CGI scripts on the web are written in Perl. You need the perl package installed on your system so that your system can handle Perl scripts. Install this package if you want to program in Perl or enable your system to handle Perl scripts. ", "modified": "2016-07-15T18:21:54", "published": "2016-07-15T18:21:54", "id": "FEDORA:C1D2D6067316", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 22 Update: perl-5.20.3-332.fc22", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6185"], "description": "Perl is a high-level programming language with roots in C, sed, awk and she ll scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming. Install this package if you want to program in Perl or enable your system to handle Perl scripts with /usr/bin/perl interpreter. If your script requires some Perl modules, you can install them with \"perl(MODULE)\" where \"MODULE\" is a name of required module. E.g. install \"perl(Test::More)\" to make Test::More Perl module available. If you need all the Perl modules that come with upstream Perl sources, so called core modules, install perl-core package. If you only need perl run-time as a shared library, i.e. Perl interpreter embedded into another application, the only essential package is perl-libs. Perl header files can be found in perl-devel package. Perl utils like \"splain\" or \"perlbug\" can be found in perl-utils package. ", "modified": "2016-07-18T18:33:47", "published": "2016-07-18T18:33:47", "id": "FEDORA:2E7CF6087563", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: perl-5.22.2-361.fc24", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6185"], "description": "Perl is a high-level programming language with roots in C, sed, awk and she ll scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming. Install this package if you want to program in Perl or enable your system to handle Perl scripts with /usr/bin/perl interpreter. If your script requires some Perl modules, you can install them with \"perl(MODULE)\" where \"MODULE\" is a name of required module. E.g. install \"perl(Test::More)\" to make Test::More Perl module available. If you need all the Perl modules that come with upstream Perl sources, so called core modules, install perl-core package. If you only need perl run-time as a shared library, i.e. Perl interpreter embedded into another application, the only essential package is perl-libs. Perl header files can be found in perl-devel package. ", "modified": "2016-07-18T20:57:05", "published": "2016-07-18T20:57:05", "id": "FEDORA:19C0160129CA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: perl-5.22.2-353.fc23", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238"], "description": "Perl is a high-level programming language with roots in C, sed, awk and she ll scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming. Install this package if you want to program in Perl or enable your system to handle Perl scripts with /usr/bin/perl interpreter. If your script requires some Perl modules, you can install them with \"perl(MODULE)\" where \"MODULE\" is a name of required module. E.g. install \"perl(Test::More)\" to make Test::More Perl module available. If you need all the Perl modules that come with upstream Perl sources, so called core modules, install perl-core package. If you only need perl run-time as a shared library, i.e. Perl interpreter embedded into another application, the only essential package is perl-libs. Perl header files can be found in perl-devel package. Perl utils like \"splain\" or \"perlbug\" can be found in perl-utils package. ", "modified": "2016-08-04T20:55:31", "published": "2016-08-04T20:55:31", "id": "FEDORA:0D7936087A9D", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: perl-5.22.2-362.fc24", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238"], "description": "This module provides simple ways to query and possibly load any of the modu les you have installed on your system during run-time. ", "modified": "2016-08-08T23:59:42", "published": "2016-08-08T23:59:42", "id": "FEDORA:402146014575", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: perl-Module-Load-Conditional-0.68-1.fc23", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238"], "description": "This module provides simple ways to query and possibly load any of the modu les you have installed on your system during run-time. ", "modified": "2016-08-08T20:34:46", "published": "2016-08-08T20:34:46", "id": "FEDORA:109E46048D5B", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: perl-Module-Load-Conditional-0.68-1.fc24", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238"], "description": "Perl is a high-level programming language with roots in C, sed, awk and she ll scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications are system administration utilities and web programming. Install this package if you want to program in Perl or enable your system to handle Perl scripts with /usr/bin/perl interpreter. If your script requires some Perl modules, you can install them with \"perl(MODULE)\" where \"MODULE\" is a name of required module. E.g. install \"perl(Test::More)\" to make Test::More Perl module available. If you need all the Perl modules that come with upstream Perl sources, so called core modules, install perl-core package. If you only need perl run-time as a shared library, i.e. Perl interpreter embedded into another application, the only essential package is perl-libs. Perl header files can be found in perl-devel package. ", "modified": "2016-08-19T22:22:44", "published": "2016-08-19T22:22:44", "id": "FEDORA:226986090E6E", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: perl-5.22.2-354.fc23", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238", "CVE-2017-15705", "CVE-2018-11780", "CVE-2018-11781"], "description": "SpamAssassin provides you with a way to reduce if not completely eliminate Unsolicited Commercial Email (SPAM) from your incoming email. It can be invoked by a MDA such as sendmail or postfix, or can be called from a procmail script, .forward file, etc. It uses a genetic-algorithm evolved scoring system to identify messages which look spammy, then adds headers to the message so they can be filtered by the user's mail reading software. This distribution includes the spamd/spamc components which create a server that considerably speeds processing of mail. To enable spamassassin, if you are receiving mail locally, simply add this line to your ~/.procmailrc: INCLUDERC=3D/etc/mail/spamassassin/spamassassin-default.rc To filter spam for all users, add that line to /etc/procmailrc (creating if necessary). ", "modified": "2018-09-29T23:57:23", "published": "2018-09-29T23:57:23", "id": "FEDORA:D448D607798F", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: spamassassin-3.4.2-2.fc27", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238", "CVE-2017-15705", "CVE-2018-11780", "CVE-2018-11781"], "description": "SpamAssassin provides you with a way to reduce if not completely eliminate Unsolicited Commercial Email (SPAM) from your incoming email. It can be invoked by a MDA such as sendmail or postfix, or can be called from a procmail script, .forward file, etc. It uses a genetic-algorithm evolved scoring system to identify messages which look spammy, then adds headers to the message so they can be filtered by the user's mail reading software. This distribution includes the spamd/spamc components which create a server that considerably speeds processing of mail. To enable spamassassin, if you are receiving mail locally, simply add this line to your ~/.procmailrc: INCLUDERC=3D/etc/mail/spamassassin/spamassassin-default.rc To filter spam for all users, add that line to /etc/procmailrc (creating if necessary). ", "modified": "2018-09-23T20:19:52", "published": "2018-09-23T20:19:52", "id": "FEDORA:6A601603125C", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: spamassassin-3.4.2-2.fc28", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:37", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6185"], "description": "\nJakub Wilk reports:\n\nXSLoader tries to load code from a subdirectory in the cwd when\n\t called inside a string eval\n\n", "edition": 4, "modified": "2016-08-22T00:00:00", "published": "2016-06-30T00:00:00", "id": "3E08047F-5A6C-11E6-A6C3-14DAE9D210B8", "href": "https://vuxml.freebsd.org/freebsd/3e08047f-5a6c-11e6-a6c3-14dae9d210b8.html", "title": "p5-XSLoader -- local arbitrary code execution", "type": "freebsd", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:32:37", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238"], "description": "\nSawyer X reports:\n\nPerl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do\n\t not properly remove . (period) characters from the end of the includes\n\t directory array, which might allow local users to gain privileges via a\n\t Trojan horse module under the current working directory.\n\n", "edition": 4, "modified": "2016-08-22T00:00:00", "published": "2016-07-21T00:00:00", "id": "72BFBB09-5A6A-11E6-A6C3-14DAE9D210B8", "href": "https://vuxml.freebsd.org/freebsd/72bfbb09-5a6a-11e6-a6c3-14dae9d210b8.html", "title": "perl -- local arbitrary code execution", "type": "freebsd", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:31:51", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15705", "CVE-2016-1238", "CVE-2018-11781", "CVE-2018-11780"], "description": "\nthe Apache Spamassassin project reports:\n\nIn Apache SpamAssassin, using HTML::Parser, we setup an object and\n\t hook into the begin and end tag event handlers In both cases, the\n\t \"open\" event is immediately followed by a \"close\" event - even if\n\t the tag *does not* close in the HTML being parsed.\nBecause of this, we are missing the \"text\" event to deal with\n\t the object normally. This can cause carefully crafted emails that\n\t might take more scan time than expected leading to a Denial of\n\t Service.\nFix a reliance on \".\" in @INC in one configuration script. Whether\n\t this can be exploited in any way is uncertain.\nFix a potential Remote Code Execution bug with the PDFInfo plugin.\n\t Thanks to cPanel Security Team for their report of this issue.\n Fourth, this release fixes a local user code injection in the\n\t meta rule syntax. Thanks again to cPanel Security Team for their\n\t report of this issue.\n\n", "edition": 3, "modified": "2018-09-16T00:00:00", "published": "2018-09-16T00:00:00", "id": "613193A0-C1B4-11E8-AE2D-54E1AD3D6335", "href": "https://vuxml.freebsd.org/freebsd/613193a0-c1b4-11e8-ae2d-54e1ad3d6335.html", "title": "spamassassin -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2019-03-06T23:51:17", "bulletinFamily": "unix", "cvelist": ["CVE-2016-1238"], "description": "This update for amavisd-new fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2016-1238: Workedaround a perl vulnerability by removing a trailing\n dot element from @INC (bsc#987887).\n\n Other issues addressed:\n\n - update to version 2.11.1 (bsc#1123389).\n - amavis-services: bumping up syslog level from LOG_NOTICE to LOG_ERR for\n a message "PID <pid> went away", and removed redundant newlines from\n some log messages\n - avoid warning messages "Use of uninitialized value in subroutine entry"\n in Encode::MIME::Header when the $check argument is undefined\n - @sa_userconf_maps has been extended to allow loading of per-recipient\n (or per-policy bank, or global) SpamAssassin configuration set from\n LDAP. For consistency with SQL a @sa_userconf_maps entry prefixed with\n 'ldap:' will load SpamAssassin configuration set using the\n load_scoreonly_ldap() method.\n - add some Sanesecurity.Foxhole false positives to the default list\n @virus_name_to_spam_score_maps\n\n - update amavis-milter to version 2.6.1:\n * Fixed a bug when creating amavisd-new policy bank names\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-03-06T21:10:12", "published": "2019-03-06T21:10:12", "id": "OPENSUSE-SU-2019:0297-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00007.html", "title": "Security update for amavisd-new (moderate)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2019-08-06T23:22:29", "bulletinFamily": "unix", "cvelist": ["CVE-2017-15705", "CVE-2016-1238", "CVE-2018-11781", "CVE-2018-11780"], "description": "This update for spamassassin to version 3.4.2 fixes the following issues:\n\n Security issues fixed:\n\n - CVE-2018-11781: Fixed an issue where a local user could inject code in\n the meta rule syntax (bsc#1108748).\n - CVE-2018-11780: Fixed a potential remote code execution vulnerability in\n the PDFInfo plugin (bsc#1108750).\n - CVE-2017-15705: Fixed a denial of service through unclosed tags in\n crafted emails (bsc#1108745).\n - CVE-2016-1238: Fixed an issue where perl would load modules from the\n current directory (bsc#1108749).\n\n Non-security issues fixed:\n\n - Use systemd timers instead of cron (bsc#1115411)\n - Fixed incompatibility with Net::DNS >= 1.01 (bsc#1107765)\n - Fixed warning about deprecated regex during sa-update (bsc#1069831)\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-08-06T21:14:29", "published": "2019-08-06T21:14:29", "id": "OPENSUSE-SU-2019:1831-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html", "title": "Security update for spamassassin (moderate)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-10-11T05:54:20", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6262", "CVE-2016-7056", "CVE-2017-7407", "CVE-2015-8388", "CVE-2016-8620", "CVE-2016-8623", "CVE-2017-9233", "CVE-2016-5420", "CVE-2016-9840", "CVE-2016-3705", "CVE-2016-1840", "CVE-2014-0191", "CVE-2016-8615", "CVE-2016-8616", "CVE-2015-5276", "CVE-2015-3210", "CVE-2015-2325", "CVE-2016-6261", "CVE-2016-8619", "CVE-2017-10685", "CVE-2016-6306", "CVE-2016-2183", "CVE-2015-0860", "CVE-2016-2178", "CVE-2015-8391", "CVE-2016-6263", "CVE-2016-2108", "CVE-2016-9063", "CVE-2016-8618", "CVE-2016-1762", "CVE-2016-6302", "CVE-2016-5300", "CVE-2015-8395", "CVE-2016-7141", "CVE-2016-1834", "CVE-2017-11112", "CVE-2016-2177", "CVE-2014-7169", "CVE-2015-8382", "CVE-2016-3627", "CVE-2015-1283", "CVE-2014-6277", "CVE-2016-2105", "CVE-2016-9318", "CVE-2016-4483", "CVE-2016-2107", "CVE-2017-3731", "CVE-2015-8386", "CVE-2014-6278", "CVE-2015-2327", "CVE-2017-9049", "CVE-2016-3075", "CVE-2016-8617", "CVE-2016-9842", "CVE-2016-7796", "CVE-2017-2616", "CVE-2016-0634", "CVE-2012-6702", "CVE-2015-3238", "CVE-2016-2180", "CVE-2016-1835", "CVE-2016-0787", "CVE-2016-8610", "CVE-2016-1234", "CVE-2016-0718", "CVE-2016-6185", "CVE-2015-8392", "CVE-2016-4574", "CVE-2015-8389", "CVE-2016-2109", "CVE-2015-8380", "CVE-2016-2181", "CVE-2016-6304", "CVE-2016-4449", "CVE-2017-9048", "CVE-2014-8964", "CVE-2015-2059", "CVE-2017-11113", "CVE-2016-1283", "CVE-2016-6313", "CVE-2016-1837", "CVE-2016-6318", "CVE-2015-3622", "CVE-2016-4448", "CVE-2016-1238", "CVE-2015-8393", "CVE-2016-1838", "CVE-2016-3706", "CVE-2016-4429", "CVE-2016-2381", "CVE-2016-7543", "CVE-2017-1000101", "CVE-2016-8622", "CVE-2015-8853", "CVE-2014-7187", "CVE-2015-8394", "CVE-2016-4008", "CVE-2014-9770", "CVE-2015-3217", "CVE-2014-6271", "CVE-2017-7526", "CVE-2016-3191", "CVE-2017-1000366", "CVE-2016-1839", "CVE-2016-8624", "CVE-2015-8384", "CVE-2016-9843", "CVE-2017-9047", "CVE-2015-8948", "CVE-2014-7824", "CVE-2015-8842", "CVE-2016-9597", "CVE-2016-6303", "CVE-2015-8383", "CVE-2017-1000100", "CVE-2015-8381", "CVE-2016-2182", "CVE-2016-5421", "CVE-2016-9586", "CVE-2015-5073", "CVE-2016-4447", "CVE-2016-5011", "CVE-2015-7511", "CVE-2015-8385", "CVE-2015-8806", "CVE-2016-9841", "CVE-2016-4579", "CVE-2015-0245", "CVE-2016-2037", "CVE-2016-2073", "CVE-2016-5419", "CVE-2015-2328", "CVE-2017-6507", "CVE-2016-4658", "CVE-2016-7167", "CVE-2017-10684", "CVE-2016-2179", "CVE-2016-2106", "CVE-2016-1833", "CVE-2015-8387", "CVE-2016-8621", "CVE-2015-8390", "CVE-2017-9050"], "description": "The SUSE Linux Enterprise Server 12 SP1 container image has been updated\n to include security and stability fixes.\n\n The following issues related to building of the container images have been\n fixed:\n\n - Included krb5 package to avoid the inclusion of krb5-mini which gets\n selected as a dependency by the Build Service solver. (bsc#1056193)\n - Do not install recommended packages when building container images.\n (bsc#975726)\n\n A number of security issues that have been already fixed by updates\n released for SUSE Linux Enterprise Server 12 SP1 are now included in the\n base image. A package/CVE cross-reference is available below.\n\n pam:\n\n - CVE-2015-3238\n\n libtasn1:\n\n - CVE-2015-3622\n - CVE-2016-4008\n\n expat:\n\n expat:\n\n - CVE-2012-6702\n - CVE-2015-1283\n - CVE-2016-0718\n - CVE-2016-5300\n - CVE-2016-9063\n - CVE-2017-9233\n\n libidn:\n\n - CVE-2015-2059\n - CVE-2015-8948\n - CVE-2016-6261\n - CVE-2016-6262\n - CVE-2016-6263\n\n\n zlib:\n\n - CVE-2016-9840\n - CVE-2016-9841\n - CVE-2016-9842\n - CVE-2016-9843\n\n curl:\n\n - CVE-2016-5419\n - CVE-2016-5420\n - CVE-2016-5421\n - CVE-2016-7141\n - CVE-2016-7167\n - CVE-2016-8615\n - CVE-2016-8616\n - CVE-2016-8617\n - CVE-2016-8618\n - CVE-2016-8619\n - CVE-2016-8620\n - CVE-2016-8621\n - CVE-2016-8622\n - CVE-2016-8623\n - CVE-2016-8624\n - CVE-2016-9586\n - CVE-2017-1000100\n - CVE-2017-1000101\n - CVE-2017-7407\n\n openssl:\n\n - CVE-2016-2105\n - CVE-2016-2106\n - CVE-2016-2107\n - CVE-2016-2108\n - CVE-2016-2109\n - CVE-2016-2177\n - CVE-2016-2178\n - CVE-2016-2179\n - CVE-2016-2180\n - CVE-2016-2181\n - CVE-2016-2182\n - CVE-2016-2183\n - CVE-2016-6302\n - CVE-2016-6303\n - CVE-2016-6304\n - CVE-2016-6306\n - CVE-2016-7056\n - CVE-2016-8610\n - CVE-2017-3731\n\n cracklib:\n\n - CVE-2016-6318\n\n pcre:\n\n - CVE-2014-8964\n - CVE-2015-2325\n - CVE-2015-2327\n - CVE-2015-2328\n - CVE-2015-3210\n - CVE-2015-3217\n - CVE-2015-5073\n - CVE-2015-8380\n - CVE-2015-8381\n - CVE-2015-8382\n - CVE-2015-8383\n - CVE-2015-8384\n - CVE-2015-8385\n - CVE-2015-8386\n - CVE-2015-8387\n - CVE-2015-8388\n - CVE-2015-8389\n - CVE-2015-8390\n - CVE-2015-8391\n - CVE-2015-8392\n - CVE-2015-8393\n - CVE-2015-8394\n - CVE-2015-8395\n - CVE-2016-1283\n - CVE-2016-3191\n\n appamor:\n\n - CVE-2017-6507\n\n bash:\n\n - CVE-2014-6277\n - CVE-2014-6278\n - CVE-2016-0634\n - CVE-2016-7543\n\n cpio:\n\n - CVE-2016-2037\n\n glibc:\n\n - CVE-2016-1234\n - CVE-2016-3075\n - CVE-2016-3706\n - CVE-2016-4429\n - CVE-2017-1000366\n\n perl:\n\n - CVE-2015-8853\n - CVE-2016-1238\n - CVE-2016-2381\n - CVE-2016-6185\n\n libssh2_org:\n\n - CVE-2016-0787\n\n util-linux:\n\n - CVE-2016-5011\n - CVE-2017-2616\n\n ncurses:\n\n - CVE-2017-10684\n - CVE-2017-10685\n - CVE-2017-11112\n - CVE-2017-11113\n\n libksba:\n\n - CVE-2016-4574\n - CVE-2016-4579\n\n libxml2:\n\n - CVE-2014-0191\n - CVE-2015-8806\n - CVE-2016-1762\n - CVE-2016-1833\n - CVE-2016-1834\n - CVE-2016-1835\n - CVE-2016-1837\n - CVE-2016-1838\n - CVE-2016-1839\n - CVE-2016-1840\n - CVE-2016-2073\n - CVE-2016-3627\n - CVE-2016-3705\n - CVE-2016-4447\n - CVE-2016-4448\n - CVE-2016-4449\n - CVE-2016-4483\n - CVE-2016-4658\n - CVE-2016-9318\n - CVE-2016-9597\n - CVE-2017-9047\n - CVE-2017-9048\n - CVE-2017-9049\n - CVE-2017-9050\n\n libgcrypt:\n\n - CVE-2015-7511\n - CVE-2016-6313\n - CVE-2017-7526\n\n update-alternatives:\n\n - CVE-2015-0860\n\n systemd:\n\n - CVE-2014-9770\n - CVE-2015-8842\n - CVE-2016-7796\n\n dbus-1:\n\n - CVE-2014-7824\n - CVE-2015-0245\n\n Finally, the following packages received non-security fixes:\n\n - augeas\n - bzip2\n - ca-certificates-mozilla\n - coreutils\n - cryptsetup\n - cyrus-sasl\n - dirmngr\n - e2fsprogs\n - findutils\n - gpg2\n - insserv-compat\n - kmod\n - libcap\n - libsolv\n - libzypp\n - lua51\n - lvm2\n - netcfg\n - p11-kit\n - permissions\n - procps\n - rpm\n - sed\n - sg3_utils\n - shadow\n - zypper\n\n", "edition": 1, "modified": "2017-10-11T03:07:32", "published": "2017-10-11T03:07:32", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html", "id": "SUSE-SU-2017:2700-1", "title": "Security update for SLES 12-SP1 Docker image (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-10-11T05:54:19", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6262", "CVE-2017-7407", "CVE-2015-8388", "CVE-2016-8620", "CVE-2016-8623", "CVE-2017-9233", "CVE-2016-5420", "CVE-2016-9840", "CVE-2016-3705", "CVE-2016-1840", "CVE-2014-0191", "CVE-2016-8615", "CVE-2016-8616", "CVE-2015-5276", "CVE-2015-3210", "CVE-2015-2325", "CVE-2016-6261", "CVE-2016-8619", "CVE-2017-10685", "CVE-2016-6306", "CVE-2016-2183", "CVE-2016-2178", "CVE-2015-8391", "CVE-2016-6263", "CVE-2016-2108", "CVE-2016-9063", "CVE-2016-8618", "CVE-2016-1762", "CVE-2016-6302", "CVE-2016-5300", "CVE-2015-8395", "CVE-2016-7141", "CVE-2016-1834", "CVE-2017-11112", "CVE-2016-2177", "CVE-2014-7169", "CVE-2015-8382", "CVE-2016-3627", "CVE-2015-1283", "CVE-2014-6277", "CVE-2016-2105", "CVE-2016-9318", "CVE-2016-4483", "CVE-2016-2107", "CVE-2015-8386", "CVE-2014-6278", "CVE-2015-2327", "CVE-2017-9049", "CVE-2016-3075", "CVE-2016-8617", "CVE-2016-9842", "CVE-2016-7796", "CVE-2017-2616", "CVE-2016-0634", "CVE-2012-6702", "CVE-2015-3238", "CVE-2016-2180", "CVE-2016-1835", "CVE-2016-0787", "CVE-2016-1234", "CVE-2016-0718", "CVE-2016-6185", "CVE-2015-8392", "CVE-2016-4574", "CVE-2015-8389", "CVE-2016-2109", "CVE-2015-8380", "CVE-2016-2181", "CVE-2016-6304", "CVE-2016-4449", "CVE-2017-9048", "CVE-2014-8964", "CVE-2015-2059", "CVE-2017-11113", "CVE-2016-1283", "CVE-2016-6313", "CVE-2016-1837", "CVE-2016-6318", "CVE-2015-3622", "CVE-2016-4448", "CVE-2016-1238", "CVE-2015-8393", "CVE-2016-1838", "CVE-2016-3706", "CVE-2016-4429", "CVE-2016-2381", "CVE-2016-7543", "CVE-2017-1000101", "CVE-2016-8622", "CVE-2015-8853", "CVE-2014-7187", "CVE-2015-8394", "CVE-2016-4008", "CVE-2014-9770", "CVE-2015-3217", "CVE-2014-6271", "CVE-2017-7526", "CVE-2016-3191", "CVE-2017-1000366", "CVE-2016-1839", "CVE-2016-8624", "CVE-2015-8384", "CVE-2016-9843", "CVE-2017-9047", "CVE-2015-8948", "CVE-2014-7824", "CVE-2015-8842", "CVE-2016-9597", "CVE-2015-5218", "CVE-2016-6303", "CVE-2015-8383", "CVE-2017-1000100", "CVE-2015-8381", "CVE-2016-2182", "CVE-2016-5421", "CVE-2016-9586", "CVE-2015-5073", "CVE-2016-4447", "CVE-2016-5011", "CVE-2015-7511", "CVE-2015-8385", "CVE-2015-8806", "CVE-2016-9841", "CVE-2016-4579", "CVE-2015-0245", "CVE-2016-2037", "CVE-2016-2073", "CVE-2016-5419", "CVE-2015-2328", "CVE-2017-6507", "CVE-2016-4658", "CVE-2016-7167", "CVE-2017-10684", "CVE-2016-2179", "CVE-2016-2106", "CVE-2016-1833", "CVE-2015-8387", "CVE-2016-8621", "CVE-2015-8390", "CVE-2017-9050"], "description": "The SUSE Linux Enterprise Server 12 container image has been updated to\n include security and stability fixes.\n\n The following issues related to building of the container images have been\n fixed:\n\n - Included krb5 package to avoid the inclusion of krb5-mini which gets\n selected as a dependency by the Build Service solver. (bsc#1056193)\n - Do not install recommended packages when building container images.\n (bsc#975726)\n\n A number of security issues that have been already fixed by updates\n released for SUSE Linux Enterprise Server 12 are now included in the base\n image. A package/CVE cross-reference is available below.\n\n pam:\n\n - CVE-2015-3238\n\n libtasn1:\n\n - CVE-2015-3622\n - CVE-2016-4008\n\n libidn:\n\n - CVE-2015-2059\n - CVE-2015-8948\n - CVE-2016-6261\n - CVE-2016-6262\n - CVE-2016-6263\n\n zlib:\n\n - CVE-2016-9840\n - CVE-2016-9841\n - CVE-2016-9842\n - CVE-2016-9843\n\n curl:\n\n - CVE-2016-5419\n - CVE-2016-5420\n - CVE-2016-5421\n - CVE-2016-7141\n - CVE-2016-7167\n - CVE-2016-8615\n - CVE-2016-8616\n - CVE-2016-8617\n - CVE-2016-8618\n - CVE-2016-8619\n - CVE-2016-8620\n - CVE-2016-8621\n - CVE-2016-8622\n - CVE-2016-8623\n - CVE-2016-8624\n - CVE-2016-9586\n - CVE-2017-1000100\n - CVE-2017-1000101\n - CVE-2017-7407\n\n openssl:\n\n - CVE-2016-2105\n - CVE-2016-2106\n - CVE-2016-2107\n - CVE-2016-2108\n - CVE-2016-2109\n - CVE-2016-2177\n - CVE-2016-2178\n - CVE-2016-2179\n - CVE-2016-2180\n - CVE-2016-2181\n - CVE-2016-2182\n - CVE-2016-2183\n - CVE-2016-6302\n - CVE-2016-6303\n - CVE-2016-6304\n - CVE-2016-6306\n\n libxml2:\n\n - CVE-2014-0191\n - CVE-2015-8806\n - CVE-2016-1762\n - CVE-2016-1833\n - CVE-2016-1834\n - CVE-2016-1835\n - CVE-2016-1837\n - CVE-2016-1838\n - CVE-2016-1839\n - CVE-2016-1840\n - CVE-2016-2073\n - CVE-2016-3627\n - CVE-2016-3705\n - CVE-2016-4447\n - CVE-2016-4448\n - CVE-2016-4449\n - CVE-2016-4483\n - CVE-2016-4658\n - CVE-2016-9318\n - CVE-2016-9597\n - CVE-2017-9047\n - CVE-2017-9048\n - CVE-2017-9049\n - CVE-2017-9050\n\n util-linux:\n\n - CVE-2015-5218\n - CVE-2016-5011\n - CVE-2017-2616\n\n cracklib:\n\n - CVE-2016-6318\n\n systemd:\n\n - CVE-2014-9770\n - CVE-2015-8842\n - CVE-2016-7796\n\n pcre:\n\n - CVE-2014-8964\n - CVE-2015-2325\n - CVE-2015-2327\n - CVE-2015-2328\n - CVE-2015-3210\n - CVE-2015-3217\n - CVE-2015-5073\n - CVE-2015-8380\n - CVE-2015-8381\n - CVE-2015-8382\n - CVE-2015-8383\n - CVE-2015-8384\n - CVE-2015-8385\n - CVE-2015-8386\n - CVE-2015-8387\n - CVE-2015-8388\n - CVE-2015-8389\n - CVE-2015-8390\n - CVE-2015-8391\n - CVE-2015-8392\n - CVE-2015-8393\n - CVE-2015-8394\n - CVE-2015-8395\n - CVE-2016-1283\n - CVE-2016-3191\n\n appamor:\n\n - CVE-2017-6507\n\n bash:\n\n - CVE-2014-6277\n - CVE-2014-6278\n - CVE-2016-0634\n - CVE-2016-7543\n\n cpio:\n\n - CVE-2016-2037\n\n glibc:\n\n - CVE-2016-1234\n - CVE-2016-3075\n - CVE-2016-3706\n - CVE-2016-4429\n - CVE-2017-1000366\n\n perl:\n\n - CVE-2015-8853\n - CVE-2016-1238\n - CVE-2016-2381\n - CVE-2016-6185\n\n libssh2_org:\n\n - CVE-2016-0787\n\n expat:\n\n - CVE-2012-6702\n - CVE-2015-1283\n - CVE-2016-0718\n - CVE-2016-5300\n - CVE-2016-9063\n - CVE-2017-9233\n\n ncurses:\n\n - CVE-2017-10684\n - CVE-2017-10685\n - CVE-2017-11112\n - CVE-2017-11113\n\n libksba:\n\n - CVE-2016-4574\n - CVE-2016-4579\n\n libgcrypt:\n\n - CVE-2015-7511\n - CVE-2016-6313\n - CVE-2017-7526\n\n dbus-1:\n\n - CVE-2014-7824\n - CVE-2015-0245\n\n Finally, the following packages received non-security fixes:\n\n - augeas\n - bzip2\n - ca-certificates-mozilla\n - coreutils\n - cryptsetup\n - cyrus-sasl\n - dirmngr\n - e2fsprogs\n - findutils\n - gpg2\n - insserv-compat\n - kmod\n - libcap\n - libsolv\n - libzypp\n - openldap2\n - p11-kit\n - permissions\n - procps\n - rpm\n - sed\n - shadow\n - zypper\n\n", "edition": 1, "modified": "2017-10-11T03:06:53", "published": "2017-10-11T03:06:53", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html", "id": "SUSE-SU-2017:2699-1", "title": "Security update for SLES 12 Docker image (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2020-07-02T11:41:42", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6913", "CVE-2017-6512", "CVE-2016-6185", "CVE-2015-8853"], "description": "USN-3625-1 fixed a vulnerability in Perl. This update provides \nthe corresponding update for Ubuntu 12.04 ESM.\n\nOriginal advisory details:\n\nIt was discovered that Perl incorrectly handled certain regular \nexpressions. An attacker could possibly use this issue to cause Perl to \nhang, resulting in a denial of service. (CVE-2015-8853)\n\nIt was discovered that Perl incorrectly loaded libraries from the current \nworking directory. A local attacker could possibly use this issue to \nexecute arbitrary code. (CVE-2016-6185)\n\nIt was discovered that Perl incorrectly handled the rmtree and remove_tree \nfunctions. A local attacker could possibly use this issue to set the mode \non arbitrary files. (CVE-2017-6512)\n\nGwanYeong Kim discovered that Perl incorrectly handled certain data when \nusing the pack function. An attacker could use this issue to cause Perl to \ncrash, resulting in a denial of service, or possibly execute arbitrary \ncode. (CVE-2018-6913)", "edition": 7, "modified": "2018-04-17T00:00:00", "published": "2018-04-17T00:00:00", "id": "USN-3625-2", "href": "https://ubuntu.com/security/notices/USN-3625-2", "title": "Perl vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-02T11:39:18", "bulletinFamily": "unix", "cvelist": ["CVE-2018-6913", "CVE-2017-6512", "CVE-2016-6185", "CVE-2018-6797", "CVE-2015-8853", "CVE-2018-6798"], "description": "It was discovered that Perl incorrectly handled certain regular \nexpressions. An attacker could possibly use this issue to cause Perl to \nhang, resulting in a denial of service. This issue only affected Ubuntu \n14.04 LTS. (CVE-2015-8853)\n\nIt was discovered that Perl incorrectly loaded libraries from the current \nworking directory. A local attacker could possibly use this issue to \nexecute arbitrary code. This issue only affected Ubuntu 14.04 LTS and \nUbuntu 16.04 LTS. (CVE-2016-6185)\n\nIt was discovered that Perl incorrectly handled the rmtree and remove_tree \nfunctions. A local attacker could possibly use this issue to set the mode \non arbitrary files. This issue only affected Ubuntu 14.04 LTS and Ubuntu \n16.04 LTS. (CVE-2017-6512)\n\nBrian Carpenter discovered that Perl incorrectly handled certain regular \nexpressions. An attacker could use this issue to cause Perl to crash, \nresulting in a denial of service, or possibly execute arbitrary code. This \nissue has only been addressed in Ubuntu 16.04 LTS and Ubuntu 17.10. \n(CVE-2018-6797)\n\nNguyen Duc Manh discovered that Perl incorrectly handled certain regular \nexpressions. An attacker could use this issue to cause Perl to crash, \nresulting in a denial of service. This issue only affected Ubuntu 16.04 LTS \nand Ubuntu 17.10. (CVE-2018-6798)\n\nGwanYeong Kim discovered that Perl incorrectly handled certain data when \nusing the pack function. An attacker could use this issue to cause Perl to \ncrash, resulting in a denial of service, or possibly execute arbitrary \ncode. (CVE-2018-6913)", "edition": 6, "modified": "2018-04-16T00:00:00", "published": "2018-04-16T00:00:00", "id": "USN-3625-1", "href": "https://ubuntu.com/security/notices/USN-3625-1", "title": "Perl vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cloudfoundry": [{"lastseen": "2019-05-29T18:32:47", "bulletinFamily": "software", "cvelist": ["CVE-2018-6913", "CVE-2017-6512", "CVE-2016-6185", "CVE-2018-6797", "CVE-2015-8853", "CVE-2018-6798"], "description": "# \n\n# Severity\n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 14.04\n\n# Description\n\nIt was discovered that Perl incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause Perl to hang, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-8853)\n\nIt was discovered that Perl incorrectly loaded libraries from the current working directory. A local attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6185)\n\nIt was discovered that Perl incorrectly handled the rmtree and remove_tree functions. A local attacker could possibly use this issue to set the mode on arbitrary files. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2017-6512)\n\nBrian Carpenter discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue has only been addressed in Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-6797)\n\nNguyen Duc Manh discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-6798)\n\nGwanYeong Kim discovered that Perl incorrectly handled certain data when using the pack function. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-6913)\n\n# Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * Cloud Foundry BOSH stemcells are vulnerable, including: \n * 3363.x versions prior to 3363.60\n * 3421.x versions prior to 3421.56\n * 3445.x versions prior to 3445.42\n * 3468.x versions prior to 3468.41\n * 3541.x versions prior to 3541.24\n * 3586.x versions prior to 3586.5\n * All other stemcells not listed.\n * All versions of Cloud Foundry cflinuxfs2 prior to 1.200.0\n\n# Mitigation\n\nOSS users are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends upgrading the following BOSH stemcells: \n * Upgrade 3363.x versions to 3363.60\n * Upgrade 3421.x versions to 3421.56\n * Upgrade 3445.x versions to 3445.42\n * Upgrade 3468.x versions to 3468.41\n * Upgrade 3541.x versions to 3541.24\n * Upgrade 3586.x versions to 3586.5\n * All other stemcells should be upgraded to the latest version available on [bosh.io](<https://bosh.io>).\n * The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs2 version 1.200.0 or later.\n\n# References\n\n * [USN-3625-1](<https://usn.ubuntu.com/3625-1/>)\n * [CVE-2015-8853](<https://people.canonical.com/~ubuntu-security/cve/CVE-2015-8853>)\n * [CVE-2016-6185](<https://people.canonical.com/~ubuntu-security/cve/CVE-2016-6185>)\n * [CVE-2017-6512](<https://people.canonical.com/~ubuntu-security/cve/CVE-2017-6512>)\n * [CVE-2018-6797](<https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6797>)\n * [CVE-2018-6798](<https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6798>)\n * [CVE-2018-6913](<https://people.canonical.com/~ubuntu-security/cve/CVE-2018-6913>)\n", "edition": 6, "modified": "2018-05-09T00:00:00", "published": "2018-05-09T00:00:00", "id": "CFOUNDRY:FA7BC5305B374333F5A5DADEC36DEA52", "href": "https://www.cloudfoundry.org/blog/usn-3625-1/", "title": "USN-3625-1: Perl vulnerabilities | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}