OracleVM 3.2 : perl (OVMSA-2016-0076)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.

Synopsis :

The remote OracleVM host is missing a security update.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- Do not extend allowable epoch values in
Time::Local::timelocal to remove useless warning on
64-bit platforms (Resolves: rhbz#1149375)

- Fix perl segfaults with custom signal handle (Resolves:

- Reorder AnyDBM_File back-end preference (Resolves:

- Fix backslash interpolation in Locale::Maketext
(Resolves: rhbz#1029016)

- Enable year 2038 for Time::Local on 64-bit platforms
(Resolves: rhbz#1057047)

- 800340 - strftime memory leak perl bug (RT#73520)

- Resolves: rhbz#800340

- Fix CVE-2012-5195 heap buffer overrun at repeatcpy
(Resolves: rhbz#915691)

- Fix CVE-2012-5526 newline injection due to improper CRLF
escaping in Set-Cookie and P3P headers (Resolves:

- Fix CVE-2012-6329 possible arbitrary code execution via
Locale::Maketext (Resolves: rhbz#915691)

- Fix CVE-2013-1667 DoS in rehashing code (Resolves:

- 848156 - Reverts code of perl-5.8.8-U32019.patch

- Resolves: rhbz#848156

See also :

Solution :

Update the affected perl package.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: OracleVM Local Security Checks

Nessus Plugin ID: 91752 ()

Bugtraq ID: 56287

CVE ID: CVE-2012-5195

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now