AIX Perl Advisory : perl_advisory4.asc

high Nessus Plugin ID 73735


The remote AIX host has a vulnerable version of Perl.


The version of Perl on the remote host is affected by a code execution vulnerability.

The _compile function in Locale::Maketext in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation. This could allow context- dependent attackers to execute arbitrary commands via crafted input.


A fix is available, and it can be downloaded from the AIX website.
For AIX 5.3 or AIX 6.1, use, and for AIX 7.1 use

IMPORTANT : If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation :

installp -apYd . perl

To install the fix package :

installp -aXYd . perl

See Also

Plugin Details

Severity: High

ID: 73735

File Name: aix_perl_advisory4.nasl

Version: 1.12

Type: local

Published: 4/28/2014

Updated: 1/4/2021

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:ibm:aix, cpe:/a:perl:perl

Required KB Items: Host/AIX/lslpp, Host/local_checks_enabled, Host/AIX/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/23/2014

Vulnerability Publication Date: 1/4/2013

Exploitable With

Metasploit (TWiki MAKETEXT Remote Command Execution)

Elliot (TWiki 5.1.2 RCE)

Reference Information

CVE: CVE-2012-6329

BID: 56852