Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-1797

Опубликовано: 08 дек. 2011
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2011-1797: perl security update (MODERATE)

[4:5.8.8-32.0.1.el5_7.6]

  • Up release number and rebuild

[4:5.8.8-32.el5.6]

  • CVE-2010-2761 CVE-2010-4410 perl: CGI module multiple issues fixed by security patch based on commit from version 3.50
  • Related: rhbz#743626

[4:5.8.8-32.el5.5]

  • CVE-2010-2761 CVE-2010-4410 perl: CGI module multiple issues fixed by update of CGI module to 3.54
  • Resolves: rhbz#743626

[4:5.8.8-32.el5.4]

  • 743010 - perl: code injection vulnerability in Digest->new()
  • Resolves: rhbz#743094

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

perl

5.8.8-32.0.1.el5_7.6

perl-suidperl

5.8.8-32.0.1.el5_7.6

Oracle Linux x86_64

perl

5.8.8-32.0.1.el5_7.6

perl-suidperl

5.8.8-32.0.1.el5_7.6

Oracle Linux i386

perl

5.8.8-32.0.1.el5_7.6

perl-suidperl

5.8.8-32.0.1.el5_7.6

Связанные уязвимости

oracle-oval
около 14 лет назад

ELSA-2011-0558: perl security and bug fix update (MODERATE)

ubuntu
больше 14 лет назад

The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.

redhat
больше 14 лет назад

The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.

nvd
больше 14 лет назад

The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.

debian
больше 14 лет назад

The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.p ...

Уязвимость ELSA-2011-1797