Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU45133
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2011-1487
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a remote non-authenticated attacker to manipulate data.
The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
MitigationInstall update from vendor's website.
Vulnerable software versionsPerl: 5.10.0 - 5.13.11
CPE2.3https://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html
https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
https://openwall.com/lists/oss-security/2011/04/01/3
https://openwall.com/lists/oss-security/2011/04/04/35
https://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99
https://rt.perl.org/rt3/Public/Bug/Display.html?id=87336
https://secunia.com/advisories/43921
https://secunia.com/advisories/44168
https://www.debian.org/security/2011/dsa-2265
https://www.mandriva.com/security/advisories?name=MDVSA-2011:091
https://www.securityfocus.com/bid/47124
https://bugzilla.redhat.com/show_bug.cgi?id=692844
https://bugzilla.redhat.com/show_bug.cgi?id=692898
https://exchange.xforce.ibmcloud.com/vulnerabilities/66528
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.