This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated Perl packages that fix a security issue in Safe.pm and a
cross-site scripting (XSS) vulnerability in CGI.pm are now available.
Perl is a high-level programming language commonly used for system
administration utilities and Web programming.
Two security issues have been found in Perl that affect the Perl
packages shipped with Red Hat Enterprise Linux :
When safe.pm versions 2.0.7 and earlier are used with Perl 5.8.0 and
earlier, it is possible for an attacker to break out of safe
compartments within Safe::reval and Safe::rdo by using a redefined @_
variable. This is due to the fact that the redefined @_ variable is
not reset between successive calls. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2002-1323
to this issue.
A cross-site scripting vulnerability was discovered in the
start_form() function of CGI.pm. The vulnerability allows a remote
attacker to insert a Web script via a URL fed into the form's action
parameter. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0615 to this issue.
Users of Perl are advised to upgrade to these erratum packages, which
contain Perl 5.6.1 with backported security patches correcting these
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.6
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12415 ()
CVE ID: CVE-2002-1323CVE-2003-0615
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.