OracleVM 3.2 : perl (OVMSA-2016-0076)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing a security update.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- Do not extend allowable epoch values in
Time::Local::timelocal to remove useless warning on
64-bit platforms (Resolves: rhbz#1149375)

- Fix perl segfaults with custom signal handle (Resolves:
rhbz#991854)

- Reorder AnyDBM_File back-end preference (Resolves:
rhbz#1018721)

- Fix backslash interpolation in Locale::Maketext
(Resolves: rhbz#1029016)

- Enable year 2038 for Time::Local on 64-bit platforms
(Resolves: rhbz#1057047)

- 800340 - strftime memory leak perl bug (RT#73520)

- Resolves: rhbz#800340

- Fix CVE-2012-5195 heap buffer overrun at repeatcpy
(Resolves: rhbz#915691)

- Fix CVE-2012-5526 newline injection due to improper CRLF
escaping in Set-Cookie and P3P headers (Resolves:
rhbz#915691)

- Fix CVE-2012-6329 possible arbitrary code execution via
Locale::Maketext (Resolves: rhbz#915691)

- Fix CVE-2013-1667 DoS in rehashing code (Resolves:
rhbz#915691)

- 848156 - Reverts code of perl-5.8.8-U32019.patch

- Resolves: rhbz#848156

See also :

https://oss.oracle.com/pipermail/oraclevm-errata/2016-June/000491.html

Solution :

Update the affected perl package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: OracleVM Local Security Checks

Nessus Plugin ID: 91752 ()

Bugtraq ID: 56287
56562
56950
58311

CVE ID: CVE-2012-5195
CVE-2012-5526
CVE-2012-6329
CVE-2013-1667

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now