Lucene search

K
amazonAmazonALAS2-2019-1166
HistoryMar 07, 2019 - 6:29 p.m.

Important: perl

2019-03-0718:29:00
alas.aws.amazon.com
20

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.4%

Issue Overview:

Perl has a buffer overflow via a crafted regular expression that triggers invalid write operations.(CVE-2018-18311)

Affected Packages:

perl

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update perl to update your system.

New Packages:

aarch64:  
    perl-5.16.3-294.amzn2.aarch64  
    perl-libs-5.16.3-294.amzn2.aarch64  
    perl-devel-5.16.3-294.amzn2.aarch64  
    perl-macros-5.16.3-294.amzn2.aarch64  
    perl-tests-5.16.3-294.amzn2.aarch64  
    perl-Time-Piece-1.20.1-294.amzn2.aarch64  
    perl-core-5.16.3-294.amzn2.aarch64  
    perl-debuginfo-5.16.3-294.amzn2.aarch64  
  
i686:  
    perl-5.16.3-294.amzn2.i686  
    perl-libs-5.16.3-294.amzn2.i686  
    perl-devel-5.16.3-294.amzn2.i686  
    perl-macros-5.16.3-294.amzn2.i686  
    perl-tests-5.16.3-294.amzn2.i686  
    perl-Time-Piece-1.20.1-294.amzn2.i686  
    perl-core-5.16.3-294.amzn2.i686  
    perl-debuginfo-5.16.3-294.amzn2.i686  
  
noarch:  
    perl-CPAN-1.9800-294.amzn2.noarch  
    perl-ExtUtils-CBuilder-0.28.2.6-294.amzn2.noarch  
    perl-ExtUtils-Embed-1.30-294.amzn2.noarch  
    perl-ExtUtils-Install-1.58-294.amzn2.noarch  
    perl-IO-Zlib-1.10-294.amzn2.noarch  
    perl-Locale-Maketext-Simple-0.21-294.amzn2.noarch  
    perl-Module-CoreList-2.76.02-294.amzn2.noarch  
    perl-Module-Loaded-0.08-294.amzn2.noarch  
    perl-Object-Accessor-0.42-294.amzn2.noarch  
    perl-Package-Constants-0.02-294.amzn2.noarch  
    perl-Pod-Escapes-1.04-294.amzn2.noarch  
  
src:  
    perl-5.16.3-294.amzn2.src  
  
x86_64:  
    perl-5.16.3-294.amzn2.x86_64  
    perl-libs-5.16.3-294.amzn2.x86_64  
    perl-devel-5.16.3-294.amzn2.x86_64  
    perl-macros-5.16.3-294.amzn2.x86_64  
    perl-tests-5.16.3-294.amzn2.x86_64  
    perl-Time-Piece-1.20.1-294.amzn2.x86_64  
    perl-core-5.16.3-294.amzn2.x86_64  
    perl-debuginfo-5.16.3-294.amzn2.x86_64  

Additional References

Red Hat: CVE-2018-18311

Mitre: CVE-2018-18311

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.4%