CVE-2012-6329

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224

http://code.activestate.com/lists/perl5-porters/187746/

http://code.activestate.com/lists/perl5-porters/187763/

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735

http://openwall.com/lists/oss-security/2012/12/11/4

http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod

http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8

http://rhn.redhat.com/errata/RHSA-2013-0685.html

http://sourceforge.net/mailarchive/message.php?msg_id=30219695

http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329

http://www.mandriva.com/security/advisories?name=MDVSA-2013:113

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/56950

http://www.ubuntu.com/usn/USN-2099-1

https://bugzilla.redhat.com/show_bug.cgi?id=884354

https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032

Details

Source: MITRE

Published: 2013-01-04

Updated: 2016-12-08

Type: CWE-94

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*

cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* versions up to 5.16.2 (inclusive)

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
91752OracleVM 3.2 : perl (OVMSA-2016-0076)NessusOracleVM Local Security Checks
high
85945F5 Networks BIG-IP : Perl vulnerabilities (K15867)NessusF5 Networks Local Security Checks
high
80730Oracle Solaris Third-Party Patch Update : perl-58 (cve_2012_6329_code_injection1)NessusSolaris Local Security Checks
high
80727Oracle Solaris Third-Party Patch Update : perl-512 (cve_2012_5195_heap_buffer)NessusSolaris Local Security Checks
high
78384GLSA-201410-02 : Perl, Perl Locale-Maketext module: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
74932openSUSE Security Update : perl (openSUSE-SU-2013:0497-1)NessusSuSE Local Security Checks
high
73735AIX Perl Advisory : perl_advisory4.ascNessusAIX Local Security Checks
high
72366Ubuntu 10.04 LTS / 12.04 LTS / 12.10 : perl vulnerability (USN-2099-1)NessusUbuntu Local Security Checks
high
69736Amazon Linux AMI : perl (ALAS-2013-177)NessusAmazon Linux Local Security Checks
high
68797Oracle Linux 5 / 6 : perl (ELSA-2013-0685)NessusOracle Linux Local Security Checks
high
66125Mandriva Linux Security Advisory : perl (MDVSA-2013:113)NessusMandriva Local Security Checks
high
65715Scientific Linux Security Update : perl on SL5.x, SL6.x i386/x86_64 (20130326)NessusScientific Linux Local Security Checks
high
65698RHEL 5 / 6 : perl (RHSA-2013:0685)NessusRed Hat Local Security Checks
high
65694CentOS 5 / 6 : perl (CESA-2013:0685)NessusCentOS Local Security Checks
high
65249SuSE 10 Security Update : Perl (ZYPP Patch Number 8479)NessusSuSE Local Security Checks
high
65247SuSE 11.2 Security Update : Perl (SAT Patch Number 7439)NessusSuSE Local Security Checks
high
64673Fedora 17 : perl-5.14.3-221.fc17 (2013-1836)NessusFedora Local Security Checks
high
64368Fedora 18 : perl-5.16.2-237.fc18 (2013-0659)NessusFedora Local Security Checks
high
64085Fedora 16 : perl-5.14.3-205.fc16 (2013-0633)NessusFedora Local Security Checks
high
63399TWiki < 5.1.3 Multiple VulnerabilitiesNessusCGI abuses
high