8.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:S/C:C/I:C/A:C
Perl is vulnerable to Remote Code Execution (RCE). The Safe module did not properly restrict the code of implicitly called methods (such as DESTROY and AUTOLOAD) on implicitly blessed objects returned as a result of unsafe code evaluation. These methods could have been executed unrestricted by Safe when such objects were accessed or destroyed. A specially-crafted Perl script executed inside of a Safe compartment could use this flaw to bypass intended Safe module restrictions.
cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
osvdb.org/64756
secunia.com/advisories/39845
secunia.com/advisories/40049
secunia.com/advisories/40052
security-tracker.debian.org/tracker/CVE-2010-1447
www.debian.org/security/2011/dsa-2267
www.mandriva.com/security/advisories?name=MDVSA-2010:115
www.mandriva.com/security/advisories?name=MDVSA-2010:116
www.openwall.com/lists/oss-security/2010/05/20/5
www.postgresql.org/about/news.1203
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2010-0457.html
www.redhat.com/support/errata/RHSA-2010-0458.html
www.securityfocus.com/bid/40305
www.securitytracker.com/id?1023988
www.vupen.com/english/advisories/2010/1167
access.redhat.com/errata/RHSA-2010:0458
bugs.launchpad.net/bugs/cve/2010-1447
bugzilla.redhat.com/show_bug.cgi?id=588269
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320