Lucene search

K
f5F5F5:K83058481
HistoryOct 16, 2017 - 12:00 a.m.

K83058481 : Perl vulnerabilities CVE-2011-1487, CVE-2011-2939, and CVE-2011-3597

2017-10-1600:00:00
my.f5.com
39

9.4 High

AI Score

Confidence

High

0.036 Low

EPSS

Percentile

91.6%

Security Advisory Description

The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.

Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.

Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.

Impact

There is no impact; F5 products are not affected by this vulnerability.