SuSE9 Security Update : perl (YOU Patch Number 11964)

high Nessus Plugin ID 41165


The remote SuSE 9 host is missing a security-related patch.


Specially crafted regular expressions could lead to a buffer overflow in perl's regular expressions engine. Scripts processing data from untrusted sources could therefore potentially be exploited by attackers to execute arbitrary code.

Depending on the purpose of the scripts, the vulnerability can be exploited remotely or locally.

The vulnerability has been tracked by CVE-2007-5116.


Apply YOU patch number 11964.

See Also

Plugin Details

Severity: High

ID: 41165

File Name: suse9_11964.nasl

Version: 1.8

Type: local

Agent: unix

Published: 9/24/2009

Updated: 1/14/2021

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: High

Score: 7


Risk Factor: High

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 11/13/2007

Reference Information

CVE: CVE-2007-5116

CWE: 119