CERTA-2005-AVI-046
Vulnerability from certfr_avis - Published: 2005-02-03 - Updated: 2005-02-24None
Description
Perl (Practical Extraction and Report Language) est un langage
interprété de programmation.
Deux vulnérabilités dans l'interpréteur Perl permettent à un utilisateur
mal intentionné d'élever ses privilèges (CAN-2005-0155) et de réaliser
un débordement de mémoire (CAN-2005-0156) qui peut conduire à
l'exécution de code arbitraire sur la plate-forme vulnérable.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Perl 5.8.6 et versions antérieures.
Impacted products
| Vendor | Product | Description |
|---|
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cTT\u003ePerl\u003c/TT\u003e 5.8.6 et versions ant\u00e9rieures.",
"content": "## Description\n\nPerl (Practical Extraction and Report Language) est un langage\ninterpr\u00e9t\u00e9 de programmation. \nDeux vuln\u00e9rabilit\u00e9s dans l\u0027interpr\u00e9teur Perl permettent \u00e0 un utilisateur\nmal intentionn\u00e9 d\u0027\u00e9lever ses privil\u00e8ges (CAN-2005-0155) et de r\u00e9aliser\nun d\u00e9bordement de m\u00e9moire (CAN-2005-0156) qui peut conduire \u00e0\nl\u0027ex\u00e9cution de code arbitraire sur la plate-forme vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2005-02-03T00:00:00",
"last_revision_date": "2005-02-24T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:031 du 08 f\u00e9vrier 2005 :",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:031"
},
{
"title": "Correctif de s\u00e9curit\u00e9 pour IBM AIX 5.2 et IBM AIX 5.3 :",
"url": "ftp://aix.software.ibm.com/aix/efixes/security/perl58x.tar"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE-SR:2005:004 du 11 f\u00e9vrier 2005 :",
"url": "http://www.novell.com/linux/security/advisories/2005_04_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:105 du 07 f\u00e9vrier 2005 :",
"url": "http://rhn.redhat.com/errata/RHSA-2005-105.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005-103 du 15 f\u00e9vrier 2005 :",
"url": "http://rhn.redhat.com/errata/RHSA-2005-103.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200502-13 du 11 f\u00e9vrier 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 du paquetage NetBSD perl58 :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/lang/perl58/README.html"
},
{
"title": "Site Internet de Perl :",
"url": "http://www.perl.com"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SGI 20050202-01-U du 09 f\u00e9vrier 2005 :",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20050202-01-U.asc"
}
],
"reference": "CERTA-2005-AVI-046",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-02-03T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:105.",
"revision_date": "2005-02-08T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2005:031.",
"revision_date": "2005-02-09T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo GLSA 200502-13, SUSE SUSE-SR:2005:004 et SGI 20050202-01-U.",
"revision_date": "2005-02-14T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:103.",
"revision_date": "2005-02-17T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au correctif de s\u00e9curit\u00e9 IBM.",
"revision_date": "2005-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de Perl",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD du 02 f\u00e9vrier 2005",
"url": "http://www.vuxml.org/freebsd/"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…