NewStart CGSL MAIN 6.06 : perl Multiple Vulnerabilities (NS-SA-2025-0211)

critical Nessus Plugin ID 266244

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 6.06, has perl packages installed that are affected by multiple vulnerabilities:

- Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count. (CVE-2018-6913)

- Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has .. sequences. (CVE-2007-4829)

- The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452. (CVE-2008-2827)

- Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match. (CVE-2009-3626)

- The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. (CVE-2011-2728)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL perl packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2025-0211

https://security.gd-linux.com/info/CVE-2007-4829

https://security.gd-linux.com/info/CVE-2008-2827

https://security.gd-linux.com/info/CVE-2009-3626

https://security.gd-linux.com/info/CVE-2011-2728

https://security.gd-linux.com/info/CVE-2011-3597

https://security.gd-linux.com/info/CVE-2012-6329

https://security.gd-linux.com/info/CVE-2013-1667

https://security.gd-linux.com/info/CVE-2016-1238

https://security.gd-linux.com/info/CVE-2016-2381

https://security.gd-linux.com/info/CVE-2016-6185

https://security.gd-linux.com/info/CVE-2018-18311

https://security.gd-linux.com/info/CVE-2018-18312

https://security.gd-linux.com/info/CVE-2018-18313

https://security.gd-linux.com/info/CVE-2018-18314

https://security.gd-linux.com/info/CVE-2018-6797

https://security.gd-linux.com/info/CVE-2018-6798

https://security.gd-linux.com/info/CVE-2018-6913

Plugin Details

Severity: Critical

ID: 266244

File Name: newstart_cgsl_NS-SA-2025-0211_perl.nasl

Version: 1.1

Type: local

Published: 9/30/2025

Updated: 9/30/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-6913

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:perl-memoize, p-cpe:/a:zte:cgsl_main:perl-math-complex, p-cpe:/a:zte:cgsl_main:perl-module-loaded, p-cpe:/a:zte:cgsl_main:perl-devel, p-cpe:/a:zte:cgsl_main:perl, p-cpe:/a:zte:cgsl_main:perl-pod-html, p-cpe:/a:zte:cgsl_main:perl-libs, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:perl-extutils-miniperl, p-cpe:/a:zte:cgsl_main:perl-io, p-cpe:/a:zte:cgsl_main:perl-open, p-cpe:/a:zte:cgsl_main:perl-locale-maketext-simple, p-cpe:/a:zte:cgsl_main:perl-net-ping, p-cpe:/a:zte:cgsl_main:perl-errno, p-cpe:/a:zte:cgsl_main:perl-devel-peek, p-cpe:/a:zte:cgsl_main:perl-utils, p-cpe:/a:zte:cgsl_main:perl-attribute-handlers, p-cpe:/a:zte:cgsl_main:perl-test, p-cpe:/a:zte:cgsl_main:perl-libnetcfg, p-cpe:/a:zte:cgsl_main:perl-macros, p-cpe:/a:zte:cgsl_main:perl-devel-selfstubber, p-cpe:/a:zte:cgsl_main:perl-io-zlib, p-cpe:/a:zte:cgsl_main:perl-time-piece, p-cpe:/a:zte:cgsl_main:perl-extutils-embed, p-cpe:/a:zte:cgsl_main:perl-interpreter, p-cpe:/a:zte:cgsl_main:perl-selfloader

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/30/2025

Vulnerability Publication Date: 9/11/2007

Reference Information

CVE: CVE-2007-4829, CVE-2008-2827, CVE-2009-3626, CVE-2011-2728, CVE-2011-3597, CVE-2012-6329, CVE-2013-1667, CVE-2016-1238, CVE-2016-2381, CVE-2016-6185, CVE-2018-18311, CVE-2018-18312, CVE-2018-18313, CVE-2018-18314, CVE-2018-6797, CVE-2018-6798, CVE-2018-6913

IAVA: 2018-A-0407-S, 2020-A-0328