Ubuntu 6.06 LTS / 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : perl vulnerabilities (USN-1129-1)

Ubuntu Security Notice (C) 2011-2013 Canonical, Inc. / NASL script (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

It was discovered that the Safe.pm Perl module incorrectly handled
Safe::reval and Safe::rdo access restrictions. An attacker could use
this flaw to bypass intended restrictions and possibly execute
arbitrary code. (CVE-2010-1168, CVE-2010-1447)

It was discovered that the CGI.pm Perl module incorrectly handled
certain MIME boundary strings. An attacker could use this flaw to
inject arbitrary HTTP headers and perform HTTP response splitting and
cross-site scripting attacks. This issue only affected Ubuntu 6.06
LTS, 8.04 LTS, 10.04 LTS and 10.10. (CVE-2010-2761, CVE-2010-4411)

It was discovered that the CGI.pm Perl module incorrectly handled
newline characters. An attacker could use this flaw to inject
arbitrary HTTP headers and perform HTTP response splitting and
cross-site scripting attacks. This issue only affected Ubuntu 6.06
LTS, 8.04 LTS, 10.04 LTS and 10.10. (CVE-2010-4410)

It was discovered that the lc, lcfirst, uc, and ucfirst functions did
not properly apply the taint attribute when processing tainted input.
An attacker could use this flaw to bypass intended restrictions. This
issue only affected Ubuntu 8.04 LTS, 10.04 LTS and 10.10.
(CVE-2011-1487).

Solution :

Update the affected perl package.

Risk factor :

High / CVSS Base Score : 8.5
(CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.0
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 55090 ()

Bugtraq ID: 40302
40305
45145
47124

CVE ID: CVE-2010-1168
CVE-2010-1447
CVE-2010-2761
CVE-2010-4410
CVE-2010-4411
CVE-2011-1487