Permissions, Privileges, and Access Controls in Perl



| Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2011-1487
CWE-ID CWE-264
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Perl
Universal components / Libraries / Scripting languages

Vendor Perl

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU45133

Risk: Medium

CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2011-1487

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Perl: 5.10.0 - 5.13.11

CPE2.3 External links

https://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html
https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
https://openwall.com/lists/oss-security/2011/04/01/3
https://openwall.com/lists/oss-security/2011/04/04/35
https://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99
https://rt.perl.org/rt3/Public/Bug/Display.html?id=87336
https://secunia.com/advisories/43921
https://secunia.com/advisories/44168
https://www.debian.org/security/2011/dsa-2265
https://www.mandriva.com/security/advisories?name=MDVSA-2011:091
https://www.securityfocus.com/bid/47124
https://bugzilla.redhat.com/show_bug.cgi?id=692844
https://bugzilla.redhat.com/show_bug.cgi?id=692898
https://exchange.xforce.ibmcloud.com/vulnerabilities/66528


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###