How to Buy
This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-201111-09
(Perl Safe module: Arbitrary Perl code injection)
Unsafe code evaluation prevents the Safe module from properly
restricting the code of implicitly called methods on implicitly blessed
A remote attacker could entice a user to load a specially crafted Perl
script, resulting in execution arbitrary Perl code outside of a
There is no known workaround at this time.
See also :
All users of the standalone Perl Safe module should upgrade to the
# emerge --sync
# emerge --ask --oneshot --verbose '>=perl-core/Safe-2.27'
All users of the Safe module bundled with Perl should upgrade to the
# emerge --sync
# emerge --ask --oneshot --verbose '>=virtual/perl-Safe-2.27'
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since July 18, 2010. It is likely that your system is already
no longer affected by this issue.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 56905 ()
Bugtraq ID: 40302
CVE ID: CVE-2010-1168
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.