Oracle Solaris Third-Party Patch Update : perl-512 (cve_2012_5195_heap_buffer)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Solaris system is missing a security patch for third-party
software.

Description :

The remote Solaris system is missing necessary patches to address
security updates :

- Heap-based buffer overflow in the Perl_repeatcpy
function in util.c in Perl 5.12.x before 5.12.5, 5.14.x
before 5.14.3, and 5.15.x before 15.15.5 allows
context-dependent attackers to cause a denial of service
(memory consumption and crash) or possibly execute
arbitrary code via the 'x' string repeat operator.
(CVE-2012-5195)

- CGI.pm module before 3.63 for Perl does not properly
escape newlines in (1) Set-Cookie or (2) P3P headers,
which might allow remote attackers to inject arbitrary
headers into responses from applications that use
CGI.pm. (CVE-2012-5526)

- The _compile function in Maketext.pm in the
Locale::Maketext implementation in Perl before 5.17.7
does not properly handle backslashes and fully qualified
method names during compilation of bracket notation,
which allows context-dependent attackers to execute
arbitrary commands via crafted input to an application
that accepts translation strings from users, as
demonstrated by the TWiki application before 5.1.3, and
the Foswiki application 1.0.x through 1.0.10 and 1.1.x
through 1.1.6. (CVE-2012-6329)

See also :

http://www.nessus.org/u?b5f8def1
https://blogs.oracle.com/sunsecurity/entry/cve_2012_5195_heap_buffer
http://www.nessus.org/u?a719d7ff
http://www.nessus.org/u?db26acdf

Solution :

Upgrade to Solaris 11.1.7.5.0.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: Solaris Local Security Checks

Nessus Plugin ID: 80727 ()

Bugtraq ID:

CVE ID: CVE-2012-5195
CVE-2012-5526
CVE-2012-6329

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now