GLSA-201111-09 : Perl Safe module: Arbitrary Perl code injection

high Nessus Plugin ID 56905

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-201111-09 (Perl Safe module: Arbitrary Perl code injection)

Unsafe code evaluation prevents the Safe module from properly restricting the code of implicitly called methods on implicitly blessed objects.
Impact :

A remote attacker could entice a user to load a specially crafted Perl script, resulting in execution arbitrary Perl code outside of a restricted compartment.
Workaround :

There is no known workaround at this time.

Solution

All users of the standalone Perl Safe module should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=perl-core/Safe-2.27' All users of the Safe module bundled with Perl should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=virtual/perl-Safe-2.27' NOTE: This is a legacy GLSA. Updates for all affected architectures are available since July 18, 2010. It is likely that your system is already no longer affected by this issue.

See Also

https://security.gentoo.org/glsa/201111-09

Plugin Details

Severity: High

ID: 56905

File Name: gentoo_GLSA-201111-09.nasl

Version: 1.10

Type: local

Published: 11/22/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:safe, p-cpe:/a:gentoo:linux:perl-safe, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/20/2011

Reference Information

CVE: CVE-2010-1168

BID: 40302

GLSA: 201111-09