AIX Perl Advisory : perl_advisory4.asc

high Nessus Plugin ID 73735

Synopsis

The remote AIX host has a vulnerable version of Perl.

Description

The version of Perl on the remote host is affected by a code execution vulnerability.

The _compile function in Locale::Maketext in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation. This could allow context- dependent attackers to execute arbitrary commands via crafted input.

Solution

A fix is available, and it can be downloaded from the AIX website.
For AIX 5.3 or AIX 6.1, use perl61.zip, and for AIX 7.1 use perl71.zip.

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . perl

To install the fix package :

installp -aXYd . perl

See Also

https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc

https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp

Plugin Details

Severity: High

ID: 73735

File Name: aix_perl_advisory4.nasl

Version: 1.13

Type: local

Published: 4/28/2014

Updated: 4/21/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:perl:perl

Required KB Items: Host/local_checks_enabled, Host/AIX/version, Host/AIX/lslpp

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/23/2014

Vulnerability Publication Date: 1/4/2013

Exploitable With

Metasploit (TWiki MAKETEXT Remote Command Execution)

Elliot (TWiki 5.1.2 RCE)

Reference Information

CVE: CVE-2012-6329

BID: 56852