Oracle Solaris Third-Party Patch Update : perl-512 (cve_2012_5195_heap_buffer)

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Solaris system is missing a security patch for third-party

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- Heap-based buffer overflow in the Perl_repeatcpy
function in util.c in Perl 5.12.x before 5.12.5, 5.14.x
before 5.14.3, and 5.15.x before 15.15.5 allows
context-dependent attackers to cause a denial of service
(memory consumption and crash) or possibly execute
arbitrary code via the 'x' string repeat operator.

- module before 3.63 for Perl does not properly
escape newlines in (1) Set-Cookie or (2) P3P headers,
which might allow remote attackers to inject arbitrary
headers into responses from applications that use (CVE-2012-5526)

- The _compile function in in the
Locale::Maketext implementation in Perl before 5.17.7
does not properly handle backslashes and fully qualified
method names during compilation of bracket notation,
which allows context-dependent attackers to execute
arbitrary commands via crafted input to an application
that accepts translation strings from users, as
demonstrated by the TWiki application before 5.1.3, and
the Foswiki application 1.0.x through 1.0.10 and 1.1.x
through 1.1.6. (CVE-2012-6329)

See also :

Solution :

Upgrade to Solaris

Risk factor :

High / CVSS Base Score : 7.5
Public Exploit Available : true

Family: Solaris Local Security Checks

Nessus Plugin ID: 80727 ()

Bugtraq ID:

CVE ID: CVE-2012-5195

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now