NewStart CGSL MAIN 7.02 : perl Vulnerability (NS-SA-2025-0251)

high Nessus Plugin ID 271288

Synopsis

The remote NewStart CGSL host is affected by a vulnerability.

Description

The remote NewStart CGSL host, running version MAIN 7.02, has perl packages installed that are affected by a vulnerability:

- A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.
$ perl -e '$_ = \x{FF} x 1000000; tr/\xFF/\x{100}/;' Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses. (CVE-2024-56406)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL perl packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2025-0251

https://security.gd-linux.com/info/CVE-2024-56406

Plugin Details

Severity: High

ID: 271288

File Name: newstart_cgsl_NS-SA-2025-0251_perl.nasl

Version: 1.1

Type: local

Published: 10/24/2025

Updated: 10/24/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

CVSS Score Source: CVE-2024-56406

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 7.3

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:perl-test, p-cpe:/a:zte:cgsl_main:perl-hash-util-fieldhash, p-cpe:/a:zte:cgsl_main:perl-extutils-embed, p-cpe:/a:zte:cgsl_main:perl-lib, p-cpe:/a:zte:cgsl_main:perl-time-piece, p-cpe:/a:zte:cgsl_main:perl-file-find, p-cpe:/a:zte:cgsl_main:perl-devel, p-cpe:/a:zte:cgsl_main:perl-utils, p-cpe:/a:zte:cgsl_main:perl-math-complex, p-cpe:/a:zte:cgsl_main:perl-sigtrap, p-cpe:/a:zte:cgsl_main:perl-file-copy, p-cpe:/a:zte:cgsl_main:perl-dbm_filter, p-cpe:/a:zte:cgsl_main:perl-meta-notation, p-cpe:/a:zte:cgsl_main:perl-libs, p-cpe:/a:zte:cgsl_main:perl-thread-semaphore, p-cpe:/a:zte:cgsl_main:perl-search-dict, p-cpe:/a:zte:cgsl_main:perl-errno, p-cpe:/a:zte:cgsl_main:perl-ipc-open3, p-cpe:/a:zte:cgsl_main:perl, p-cpe:/a:zte:cgsl_main:perl-tie-file, p-cpe:/a:zte:cgsl_main:perl-autouse, p-cpe:/a:zte:cgsl_main:perl-module-loaded, p-cpe:/a:zte:cgsl_main:perl-blib, p-cpe:/a:zte:cgsl_main:perl-file-stat, p-cpe:/a:zte:cgsl_main:perl-next, p-cpe:/a:zte:cgsl_main:perl-overloading, p-cpe:/a:zte:cgsl_main:perl-english, p-cpe:/a:zte:cgsl_main:perl-posix, p-cpe:/a:zte:cgsl_main:perl-open, p-cpe:/a:zte:cgsl_main:perl-sort, p-cpe:/a:zte:cgsl_main:perl-attribute-handlers, p-cpe:/a:zte:cgsl_main:perl-autosplit, p-cpe:/a:zte:cgsl_main:perl-gdbm_file, p-cpe:/a:zte:cgsl_main:perl-extutils-constant, p-cpe:/a:zte:cgsl_main:perl-locale-maketext-simple, p-cpe:/a:zte:cgsl_main:perl-safe, p-cpe:/a:zte:cgsl_main:perl-file-dosglob, p-cpe:/a:zte:cgsl_main:perl-getopt-std, p-cpe:/a:zte:cgsl_main:perl-selfloader, p-cpe:/a:zte:cgsl_main:perl-diagnostics, p-cpe:/a:zte:cgsl_main:perl-fields, p-cpe:/a:zte:cgsl_main:perl-file-compare, p-cpe:/a:zte:cgsl_main:perl-time, p-cpe:/a:zte:cgsl_main:perl-subs, p-cpe:/a:zte:cgsl_main:perl-i18n-langtags, p-cpe:/a:zte:cgsl_main:perl-autoloader, p-cpe:/a:zte:cgsl_main:perl-debugger, p-cpe:/a:zte:cgsl_main:perl-base, p-cpe:/a:zte:cgsl_main:perl-config-extensions, p-cpe:/a:zte:cgsl_main:perl-if, p-cpe:/a:zte:cgsl_main:perl-user-pwent, p-cpe:/a:zte:cgsl_main:perl-pod-html, p-cpe:/a:zte:cgsl_main:perl-interpreter, p-cpe:/a:zte:cgsl_main:perl-devel-peek, p-cpe:/a:zte:cgsl_main:perl-less, p-cpe:/a:zte:cgsl_main:perl-opcode, p-cpe:/a:zte:cgsl_main:perl-term-readline, p-cpe:/a:zte:cgsl_main:perl-term-complete, p-cpe:/a:zte:cgsl_main:perl-devel-selfstubber, p-cpe:/a:zte:cgsl_main:perl-sys-hostname, p-cpe:/a:zte:cgsl_main:perl-vmsish, p-cpe:/a:zte:cgsl_main:perl-pod-functions, p-cpe:/a:zte:cgsl_main:perl-hash-util, p-cpe:/a:zte:cgsl_main:perl-dumpvalue, p-cpe:/a:zte:cgsl_main:perl-ph, p-cpe:/a:zte:cgsl_main:perl-dynaloader, p-cpe:/a:zte:cgsl_main:perl-tie-memoize, p-cpe:/a:zte:cgsl_main:perl-overload, p-cpe:/a:zte:cgsl_main:perl-filecache, p-cpe:/a:zte:cgsl_main:perl-encoding-warnings, p-cpe:/a:zte:cgsl_main:perl-filehandle, p-cpe:/a:zte:cgsl_main:perl-benchmark, p-cpe:/a:zte:cgsl_main:perl-odbm_file, p-cpe:/a:zte:cgsl_main:perl-unicode-ucd, p-cpe:/a:zte:cgsl_main:perl-ndbm_file, p-cpe:/a:zte:cgsl_main:perl-doc, p-cpe:/a:zte:cgsl_main:perl-text-abbrev, p-cpe:/a:zte:cgsl_main:perl-macros, p-cpe:/a:zte:cgsl_main:perl-extutils-miniperl, p-cpe:/a:zte:cgsl_main:perl-thread, p-cpe:/a:zte:cgsl_main:perl-class-struct, p-cpe:/a:zte:cgsl_main:perl-mro, p-cpe:/a:zte:cgsl_main:perl-dirhandle, p-cpe:/a:zte:cgsl_main:perl-selectsaver, p-cpe:/a:zte:cgsl_main:perl-i18n-collate, p-cpe:/a:zte:cgsl_main:perl-memoize, p-cpe:/a:zte:cgsl_main:perl-tests, p-cpe:/a:zte:cgsl_main:perl-findbin, p-cpe:/a:zte:cgsl_main:perl-symbol, p-cpe:/a:zte:cgsl_main:perl-fcntl, p-cpe:/a:zte:cgsl_main:perl-deprecate, p-cpe:/a:zte:cgsl_main:perl-io, p-cpe:/a:zte:cgsl_main:perl-filetest, p-cpe:/a:zte:cgsl_main:perl-locale, p-cpe:/a:zte:cgsl_main:perl-tie, p-cpe:/a:zte:cgsl_main:perl-i18n-langinfo, p-cpe:/a:zte:cgsl_main:perl-file-basename, p-cpe:/a:zte:cgsl_main:perl-vars, cpe:/o:zte:cgsl_main:7, p-cpe:/a:zte:cgsl_main:perl-b, p-cpe:/a:zte:cgsl_main:perl-libnetcfg, p-cpe:/a:zte:cgsl_main:perl-net

Required KB Items: Host/local_checks_enabled, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 10/23/2025

Vulnerability Publication Date: 4/8/2025

Reference Information

CVE: CVE-2024-56406